Newsroom

Call for Researchers

Are you looking to embark on a PhD program in Cybersecurity?

Read here how to proceed.

European Symposium on Research in Computer Security
[11-15/Sep/2017]

Event Category: 

ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development

International Conference on Availability, Reliability and Security
[29-1/Aug/2017]

Event Category: 

The International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.

ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.

17th International School on Foundations of Security Analysis and Design
[28-2/Aug/2017]

Event Category: 

The International School on Foundations of Security Analysis and Design FOSAD is a one-week yearly school on cyber-security held in Bertinoro (Italy) in August-September. The main aim of the FOSAD school is to offer a good spectrum of current research in foundations of security - ranging from programming languages to analysis of protocols, from cryptographic algorithms to access control policies and trust management - that can be of help for graduate students and young researchers from academia or industry that intend to approach the field.

International Conference on Trust, Privacy And Security In Digital Business
[28-31/Aug/2017]

Event Category: 

New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision of high quality services all over the world. All these developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competitive in the global marketplace.

IEEE International Conference On Trust, Security And Privacy In Computing And Communications
[1-4/Aug/2017]

Event Category: 

With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time.

International Workshop on Security, Privacy and Performance in Cloud Computing
[17-21/Jul/2017]

Event Category: 

Cloud computing is transforming the way large-scale computation is performed. Dynamic scalability or -elasticity- provided by the cloud make high-performance computing accessible to everyone. However, cloud computing introduces new challenges with respect to security and privacy. Although virtualization addresses some of these concerns, it has a significant impact on performance: the actual gains in performance depend heavily on the predictability of physical and virtualized resources.

International Symposium on Engineering Secure Software and Systems
[3-5/Jul/2017]

Event Category: 

Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors.

Pages