Security Standardisation Research

SSR 2018


Computer Security & Cryptography



Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2018 conference. Papers may present theory, applications or practical experience in the field of security standardisation, including, but not necessarily limited to:
- access control
- biometrics
- cloud computing
- critical national infrastructure (CNI) protection
- consistency and comparison of multiple standards
- critiques of standards
- cryptanalysis
- cryptographic protocols
- cryptographic techniques
- evaluation criteria
- formal analysis of standards
- history of standardization
- identity management
- industrial control systems security
- internet security
- interoperability of standards
- intrusion detection
- key management and PKIs
- management of the standardisation process
- mobile security
- network security
- open standards and open source
- payment system security
- privacy
- regional and international standards
- RFID tag security
- risk analysis
- security controls
- security management
- security protocols
- security services
- security tokens
- smart cards
- telecommunications security
- trusted computing
- web security
New this year is that SSR will also accept Systematisation of Knowledge (SoK) papers relating to security standardisation, which integrate experience and previous research, drawing new comprehensive conclusions. SoK papers should evaluate, systematise, and contextualise existing knowledge. They should provide a new viewpoint, offer a comprehensive taxonomy, or cast doubt on long-held beliefs, based on compelling evidence. We also welcome SoK papers that document existing standardisation practices and analyse their weaknesses and strengths.
General Chair:
Marc Fischlin (TU Darmstadt, Germany)
Program Co-Chairs:
Cas Cremers (University of Oxford, UK)
Anja Lehmann (IBM Research – Zurich, Switzerland)
Program Committee:
Steve Babbage, Vodafone, UK
Liqun Chen, University of Surrey, UK
Jean Paul Degabriele, TU Darmstadt, Germany
Antoine Delignat-Lavaud, Microsoft Research, UK
Orr Dunkelman, University of Haifa, Israel
Cedric Fournet, Microsoft Research, UK
Britta Hale, Norwegian University of Science and Technology, Norway
Harry Halpin, INRIA, France
Tibor Jager, Paderborn University, Germany
John Kelsey, NIST, USA
Markulf Kohlweiss, University of Edinburgh, UK
Stephan Krenn, AIT Austrian Institute of Technology, Austria
Xuejia Lai, Shanghai Jiaotong University, China
Tancrede Lepoint, SRI International, USA
Peter Lipp, Graz University of Technology, Austria
Atul Luykx, Visa Research, USA
Catherine Meadows, Naval Research Laboratory, USA
David Naccache, ENS, France
Valtteri Niemi, University of Helsinki, Finland
Kenneth Paterson, Royal Holloway, University of London, UK
Eric Rescorla, Mozilla, USA
Matt Robshaw, Impinj, USA
Phillip Rogaway, University of California, Davis, USA
Mark Ryan, University of Birmingham, UK
Kazue Sako, NEC, Japan
Peter Schwabe, Radboud University, The Netherlands
Tom Shrimpton, University of Florida, USA
Ben Smyth, University of Luxembourg, Luxembourg
Douglas Stebila, McMaster University, Canada
Claire Vishik, Intel Corporation, UK
Michael Ward, MasterCard, UK
William Whyte, Security Innovation, USA
Instructions for Authors:
Submissions must be original and must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or to any other conference or workshop that has published proceedings.
Authors submitting a systematisation of knowledge paper should have a title consisting of “SoK: Title”. This is to ensure that the committee is made aware that the paper is an SoK paper, and so will be reviewed with different criteria.
Submitted papers must be in PDF format and written in English. The submission must be anonymous with no author names, affiliations or obvious references. It should begin with a title, a short abstract, and an introduction. Papers should be at most 16 pages (excluding bibliography and appendices) in the standard LNCS format (see instructions at http://www.springer.de/comp/lncs/authors.html.). Reviewers are not obliged to read appendices, so the paper must be self-contained without them.
Papers that do not adhere to these requirements will be rejected without consideration of their merits.
Accepted papers will be presented at the conference and published in Springer’s Lecture Notes in Computer Science (LNCS) series. At least one author of each accepted paper must register for the conference.
Submission Site:
Papers must be submitted using the EasyChair system. The link will be provided on the conference website when the system is open for submissions.