Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 5 May 2016 22:09:15 +0100
From: Shujun Li <hooklee@...il.com>
To: passwords@...ts.openwall.com
Subject: Re: CFP: Passwords 2016, Ruhr-University Bochum, Germany,
 December 5-7

Hi Per,

The call mentions "workshop" 3 times.
Do you mean "conference"?

Best,
Shujun

On 05/05/2016 21:59, Per Thorsheim wrote:
> ====================================================================
> Call for Papers
> The 11th International Conference on Passwords
> PASSWORDS 2016
>
> 5-7 December 2016
> Ruhr-University Bochum, Germany
>
> https://passwords2016.rub.de/
> ====================================================================
>
>
> The Passwords conference was launched in 2010 as a response to
> the lack of robustness and usability of current personal
> authentication practices and solutions. Annual participation has
> doubled over the past three years. Since 2014, the conference
> accepts peer-reviewed papers.
>
>
> * IMPORTANT DATES *
>
> Research papers and short papers:
> - Title and abstract submission: 2016-07-04 (23:59 UTC-11)
> - Paper submission: 2016-07-11 (23:59 UTC-11)
> - Notification of acceptance: 2016-09-05
> - Camera-ready from authors: 2016-09-19
>
> Hacker Talks:
> - Talk proposal submission: 2016-09-15 (23:59 UTC-11)
> - Notification of acceptance: 2016-09-30
>
>
> * CONFERENCE AIM *
>
> More than half a billion user passwords have been compromised
> over the last five years, including breaches at internet
> companies such as Target, Adobe, Heartland, Forbes, LinkedIn,
> Yahoo, and LivingSocial. Yet passwords, PIN codes, and similar
> remain the most prevalent method of personal
> authentication. Clearly, we have a systemic problem.
>
> This conference gathers researchers, password crackers, and
> enthusiastic experts from around the globe, aiming to better
> understand the challenges surrounding the methods personal
> authentication and passwords, and how to adequately solve these
> problems. The Passwords conference series seek to provide a
> friendly environment for participants with plenty opportunity to
> communicate with the speakers before, during, and after their
> presentations.
>
> * SCOPE *
>
> We seek original contributions that present attacks, analyses,
> designs, applications, protocols, systems, practical experiences,
> and theory. Submitted papers may include, but are not limited to,
> the following topics, all related to passwords and
> authentication:
>
> - Technical challenges and issues:
> - Cryptanalytic attacks
> - Formal attack models
> - Cryptographic protocols
> - Dictionary attacks
> - Digital forensics
> - Online attacks/Rate-limiting
> - Side-channel attacks
> - Administrative challenges:
> - Account lifecycle management
> - User identification
> - Password resets
> - Cross-domain and multi-enterprise system access
> - Hardware token administration
> - Password "replacements":
> - 2FA and multifactor authentication
> - Risk-based authentication
> - Password managers
> - Costs and economy
> - Biometrics
> - Continous authentication
> - FIDO - U2F
> - Deployed systems:
> - Best practice reports
> - Incident reports/Lessons learned
> - Human factors:
> - Usability
> - Design & UX
> - Social Engineering
> - Memorability
> - Accessibility
> - Pattern predictability
> - Gestures and graphical patterns
> - Psychology
> - Statistics (languages, age, demographics...)
> - Ethics
>
>
> * INSTRUCTIONS FOR AUTHORS *
>
> Papers must be submitted as PDF using the Springer LNCS format
> for Latex. Abstract and title must be submitted one week ahead of
> the paper deadline.
>
> We seek submissions for review in the following three categories:
>
> - Research Papers
> - Short Papers
> - "Hacker Talks" (talks without academic papers attached)
>
> RESEARCH PAPERS should describe novel, previously unpublished
> technical contributions within the scope of the call. The papers
> will be subjected to double-blind peer review by the program
> committee. Paper length is limited to 16 pages (LNCS format)
> excluding references and well-marked appendices. The paper
> submitted for review must be anonymous, hence author names,
> affiliations, acknowledgements, or obvious references must be
> temporarily edited out for the review process. The program
> committee may reject non-anonymized papers without reading
> them. The submitted paper (in PDF format) must follow the
> template described by Springer at
> http://www.springer.de/comp/lncs/authors.html.
>
> SHORT PAPERS will also be subject to peer review, where the
> emphasis will be put on work in progress, hacker achievements,
> industrial experiences, and incidents explained, aiming at
> novelty and promising directions. Short paper submissions should
> not be more than 6 pages in standard LNCS format in total. A
> short paper must be labeled by the subtitle "Short
> Paper". Accepted short paper submissions may be included in the
> conference proceedings. Short papers do not need to be
> anonymous. The program committee may accept full research papers
> as short papers.
>
> HACKER TALKS are presentations without an academic paper
> attached. They will typically explain new methods, techniques,
> tools, systems, or services within the Passwords scope. Proposals
> for Hacker Talks can be submitted by anybody ("hackers",
> academics, students, enthusiasts, etc.) in any format, but
> typically will include a brief (2-3 paragraphs) description of
> the talk's content and the person presenting. They will be
> evaluated by a separate subcommittee led by Per Thorsheim,
> according to different criteria than those used for the refereed
> papers.
>
> At least one of the authors of each accepted paper must register
> and present the paper at the workshop. Papers without a full
> registration will be withdrawn from the proceedings and from the
> workshop programme.
>
> Papers that pass the peer review process and that are presented
> at the workshop will be included in the event proceedings,
> published by Springer in the Lecture Notes in Computer
> Science (LNCS) series.
>
> Papers must be unpublished and not being considered elsewhere for
> publication. Plagiarism and self-plagiarism will be treated as a
> serious offense. Program committee members may submit papers but
> program chairs may not. The time frame for each presentation
> will be either 30 or 45 minutes, including Q&A. Publication will
> be by streaming, video and web.
>
> * ORGANIZERS *
>
> - General chair: Per Thorsheim, God Praksis AS (N)
> - Program co-chair and host: Markus Dürmuth, Ruhr-University Bochum (DE)
> - Program co-chair: Frank Stajano, University of Cambridge (UK)
>
>
> * PROGRAM COMMITTEE *
>
> (to be announced)
>
>
> * STEERING COMMITTEE *
>
> - Per Thorsheim, God Praksis AS (N)
> - Stig F. Mjolsnes, Norwegian University of Science and Technology (N)
> - Frank Stajano, University of Cambridge (UK)
>
>
> More and updated information can be found at the conference website
> https://passwords2016.rub.de/
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.