The 6th CoSDEO-workshop aims to bring together researchers and practitioners working on the design, implementation, and evaluation of systems, algorithms or models for usable security.
Recently, usable security receives a growing amount of attention in industry and from academia. This covers, for instance, novel pairing and security schemes for pervasive systems where identity cues are provided from sensor information as well as the discussion of novel sensor modalities or secure processing methodologies. The offensive side includes attacks on existing security mechanisms as well as entropy and statistical analysis of key sequences.
It is therefore the goal of this workshop to provide a publication and discussion platform for this growing community in which fundamental problems but also sophisticated approaches are presented and discussed.
Thus, we like to encourage practioners and scientists in all stages of their research, from first experiments to readily developed and evaluated systems, to submit their original work to allow a broad discussion with established field experts but also researchers relatively new to the field.
Even if work is in a very early stage all submitted work must conform to typical scientific requirements; showing a good overview of the field and the specific area of the context of interest. If the paper is based on a technical system the system should be described and discussed thoroughly.
Besides regular papers, we also encourage submission of visionary papers which need not describe completed research but contain ideas new to the field. These may be related to novel and convenient techniques for key generation and pairing, discussions on entropy and statistical properties of sensor- generated random sequences but also novel applications and designs of usable security systems.
Topics of interest include but are not limited to:
Novel usable security mechanisms in the field of pervasive computingBiometric and context-based authentication and pairing schemes, e.g., based on gait, audio, video, usage patterns, haptics, RF …Usability evaluations of new or existing security or privacy featuresUser studies in usable securityAttacks on security schemesPrivacy functionality and design for ubiquitous systemsFuzzy cryptography in security systemsQuantization approachesLessons learned from the deployment and use of usable and pervasive securityUser experience in mobile securitySecurity schemes for sharply resource limited devices in Pervasive and IoT environmentsPrivacy and anonymization aspects in usable securityNovel interfaces fostering usable securityEntropy estimation and statistical analysis for keys generated from usably secure systemsEdge-support for usable security on resource limited pervasive devicesLightweight security solutionsBiometrics on resource-limited devicesEthics and legal considerations in usable securityDetection and prevention of attacks on usably secure systemsAuthentication and access control for usably secure systemsTrust in usable securityOrchestration and collaboration between devices in usable security
03月19日
2018
03月22日
2018
注册截止日期
留言