Call for Papers
Financial Cryptography and Data Security '11
Fifteenth International Conference
February 28–March 4, 2011
Bay Gardens Beach Resort
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and inter-disciplinary efforts are particularly encouraged.
Anonymity and Privacy
Auctions and Audits
Authentication and Identification
Certification and Authorization
Cloud Computing Security
Commercial Cryptographic Applications
Transactions and Contracts
Data Outsourcing Security
Digital Cash and Payment Systems
Digital Incentive and Loyalty Systems
Digital Rights Management
Game Theoretic Approaches to Security
Phishing and Social Engineering
Legal and Regulatory Issues
Management and Operations
Microfinance and Micropayments
Mobile Internet Device Security
RFID-Based and Contactless Payment Systems
Risk Assessment and Management
Secure Banking and Financial Web Services
Securing Emerging Computational Paradigms
Security and Risk Perceptions and Judgments
Secure Tokens and Hardware
|Workshop Proposal Submission||August 6, 2010|
|Workshop Proposal Notification||August 30, 2010|
|Paper Submission||October 1, 2010, 23:59 UTC - 11 (in other time zones)|
|Paper Notification||November 15, 2010|
|Final Papers||December 17, 2010|
|Poster and Panel Submission||December 3, 2010|
|Poster and Panel Notification||December 13, 2010|
Submissions are sought in the following categories: (i) regular papers (15 pg LNCS format), (ii) short papers (8 pg), (iii) panels and workshops (2 pg), and (iv) posters (1 pg). Submissions need to be anonymized and will be double-blind reviewed.
Papers must be formatted in standard LNCS format and submitted as PDF files. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found on this web site and at the submission site.
Authors may only submit work that does not substantially overlap with work that is currently submitted or has been accepted for publication to a conference with proceedings or a journal. We consider double submission serious research fraud and will treat it as such. In case of doubt contact the program chair for any clarifications at email@example.com.
Regular Research Papers
Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages.
Short papers are also subject to peer review, however, the intention is to encourage authors to introduce work in progress, novel applications and corporate/industrial experiences. Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues. Short paper submissions are limited to 8 pages in standard LNCS format. The paper title for short papers should necessarily include the text “(a short paper)”.
We especially would like to encourage submissions of panel proposals. These should include a very brief description of the panel topics, as well as of the prospective panelists. Accepted panel sessions will be presented at the conference. Moreover, each participant will contribute a one-page abstract to be published in the conference proceedings. Please feel free to contact us directly if you would like to further discuss the suitability of a certain topic. Panel submissions should be up to 2 pages, sent to firstname.lastname@example.org.
The poster session is the perfect venue to share a provocative opinion, interesting established or preliminary work, or a cool idea that will spark discussion. Poster presenters will benefit from a multi-hour session to discuss their work, get exposure, and receive feedback from attendees. Poster submissions should be 1 page (in the same LNCS format). Please keep in mind that the poster deadline is later than the main paper submission deadline. The posters will be published in the proceedings. Poster proposals should be sent to the posters chair at email@example.com.
Proposals for workshops to be held at FC 2011 are also solicited. A workshop can be full day or half day in length. Workshop proposals should include: (i) a title, (ii) a call for papers, (iii) a brief summary and justification – including how it would fit into the greater FC scope, (iv) a (tentative) Program Committee and its Chair, (v) one-paragraph bios for key organizers, and (vi) the expected (or previous – if workshop has been held in previous years) number of submissions, participants and acceptance rates. Workshop proposals should be sent to firstname.lastname@example.org.
The Rump Session
FC'11 will also include the popular "rump session" held on one of the evenings in an informal, social atmosphere. The rump session is a program of short (5–7 minute), informal presentations on works in progress, off-the-cuff ideas, and any other matters pertinent to the conference. Any conference attendee is welcome to submit a presentation to the Rump Session Chair (to be announced at the conference). This submission should consist of a talk title, the name of the presenter, and, if desired, a very brief abstract. Submissions may be sent via e-mail, or submitted in person in the morning on the day of the session.
|General Chair||Steven Murdoch, University of Cambridge, UK|
|Local Arrangements Chair||Fabian Monrose, University of North Carolina Chapel Hill, US|
|Program Chair||George Danezis, Microsoft Research, UK|
Ross Anderson, University of Cambridge, UK
Tuomas Aura, Helsinki University of Technology, FI
Lucas Ballard, Google, US
Adam Barth, UC Berkeley, US
Elisa Bertino, Purdue University, US
Kevin Butler, University of Oregon, US
Srdjan Capkun, ETH Zurich, CH
Veronique Cortier, CNRS / LORIA, FR
Ernesto Damiani, University of Milan, IT
Claudia Diaz, K.U.Leuven, BE
Roger Dingledine, The Tor Project, US
Orr Dunkelman, Weizmann Institute of Science, IL
Simone Fisher-Hubner, Karlstad University, SE
Craig Gentry, IBM T.J.Watson Research Center, US
Dieter Gollmann, Technische Universitat Harburg, DE
Rachel Greenstadt, Drexel University, US
Jean-Pierre Hubaux, Ecole Polytechnique Federale de Lausanne, CH
Markus Jakobsson, Indiana University, US
Jaeyeon Jung, Intel Research, US
Stefan Katzenbeisser, Technische Universitat Darmstadt, DE
Angelos Keromytis, Columbia University, US
Arjen Lenstra, Ecole Polytechnique Federale de Lausanne, CH
Helger Lipmaa, Cybernetica AS, EE
Evangelos Markatos, FORTH, GR
David Molnar, Microsoft Research, US
Tyler Moore, Harvard University, US
David Naccache, Ecole normale superieure, FR
Thomas Ristenpart, University of Wisconsin, US
Peter Ryan, Universite du Luxembourg, LU
Ahmad-Reza Sadeghi, Ruhr-University Bochum, DE
Rei Safavi-Naini, University of Calgary, CA
Nigel Smart, University of Bristol, UK
Jessica Staddon, Google, US
Angelos Stavrou, George Mason University, US
Paul Syverson, Naval Research Laboratory, US
Nicholas Weaver, International Computer Science Institute, US
Moti Yung, Google, US
This conference is organized annually by the International Financial Cryptography Association.