(mobo import Concept___Events-migrated) |
m (Text replacement - "Homepage=" to "Official Website=") |
||
(2 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
|Title=13th International Conference on Provable and Practical Security | |Title=13th International Conference on Provable and Practical Security | ||
|Type=Conference | |Type=Conference | ||
− | | | + | |Official Website=https://www.monash.edu/provsec2019 |
|City=Cairns | |City=Cairns | ||
|Country=Country:AU | |Country=Country:AU | ||
Line 9: | Line 9: | ||
|has program chair=Ron Steinfeld, Tsz Hon Yuen | |has program chair=Ron Steinfeld, Tsz Hon Yuen | ||
|Attendance fee currency=1200 A$ | |Attendance fee currency=1200 A$ | ||
− | |Registration | + | |Registration Link=https://www.monash.edu/provsec2019 |
− | |||
− | |||
− | |||
|pageCreator=User:Curator 39 | |pageCreator=User:Curator 39 | ||
|pageEditor=User:Curator 39 | |pageEditor=User:Curator 39 | ||
Line 27: | Line 24: | ||
|Notification Deadline=2019/07/15 | |Notification Deadline=2019/07/15 | ||
|Submission Deadline=2019/06/24 | |Submission Deadline=2019/06/24 | ||
+ | }} | ||
+ | {{Event Metric | ||
+ | |Number Of Submitted Papers=51 | ||
+ | |Number Of Accepted Papers=18 | ||
+ | |Number Of Accepted Short Papers=6 | ||
}} | }} | ||
{{S Event}} | {{S Event}} |
Latest revision as of 14:19, 19 October 2022
Deadlines
|
||
Submission |
|
||
Paper |
|
||
Notification |
Metrics
Submitted Papers
51
Accepted Papers
18
Accepted Short Papers
6
Venue
Cairns, Australia
Warning: Venue is missing. The map might not show the exact location.
Topics
Areas of interest include, but are not limited to:
- Asymmetric provably secure cryptography
- Symmetric cryptographic primitives
- Lattice-based security reductions
- Leakage-resilient cryptography
- Privacy and anonymity technologies
- Secure cryptographic protocols and applications
- Security notions, approaches, and paradigms
- Steganography and steganalysis
- Blockchain and Cryptocurrency
- IoT Security
- Mobile security
- Cloud security
- Access control
- Privacy enhanced technology
- Viruses and malware
- Software security
- Database security
- Web security
- Operating system security
- Intrusion detection
- Big data security and privacy
- Biometric Security
- Network security
- Formal methods for security
- Digital forensics
- Security for critical infrastructures
- Embedded systems security
- Lightweight security
- Smart grid security
- Cyber-physical security
Important dates
Proceedings including all accepted papers will be published in LNCS and will be available at the conference.