征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The 6th CoSDEO-workshop aims to bring together researchers and practitioners working on the design, implementation, and evaluation of systems, algorithms or models for usable security.
Recently, usable security receives a growing amount of attention in industry and from academia. This covers, for instance, novel pairing and security schemes for pervasive systems where identity cues are provided from sensor information as well as the discussion of novel sensor modalities or secure processing methodologies. The offensive side includes attacks on existing security mechanisms as well as entropy and statistical analysis of key sequences.
It is therefore the goal of this workshop to provide a publication and discussion platform for this growing community in which fundamental problems but also sophisticated approaches are presented and discussed.
Thus, we like to encourage practioners and scientists in all stages of their research, from first experiments to readily developed and evaluated systems, to submit their original work to allow a broad discussion with established field experts but also researchers relatively new to the field.
Even if work is in a very early stage all submitted work must conform to typical scientific requirements; showing a good overview of the field and the specific area of the context of interest. If the paper is based on a technical system the system should be described and discussed thoroughly.
Besides regular papers, we also encourage submission of visionary papers which need not describe completed research but contain ideas new to the field. These may be related to novel and convenient techniques for key generation and pairing, discussions on entropy and statistical properties of sensor- generated random sequences but also novel applications and designs of usable security systems.

征稿信息

Topics of interest include but are not limited to:
Novel usable security mechanisms in the field of pervasive computingBiometric and context-based authentication and pairing schemes, e.g., based on gait, audio, video, usage patterns, haptics, RF …Usability evaluations of new or existing security or privacy featuresUser studies in usable securityAttacks on security schemesPrivacy functionality and design for ubiquitous systemsFuzzy cryptography in security systemsQuantization approachesLessons learned from the deployment and use of usable and pervasive securityUser experience in mobile securitySecurity schemes for sharply resource limited devices in Pervasive and IoT environmentsPrivacy and anonymization aspects in usable securityNovel interfaces fostering usable securityEntropy estimation and statistical analysis for keys generated from usably secure systemsEdge-support for usable security on resource limited pervasive devicesLightweight security solutionsBiometrics on resource-limited devicesEthics and legal considerations in usable securityDetection and prevention of attacks on usably secure systemsAuthentication and access control for usably secure systemsTrust in usable securityOrchestration and collaboration between devices in usable security

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    03月19日

    2018

    03月22日

    2018

  • 03月22日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询