Financial Cryptography and Data Security (FC15)
<br>19th International Conference
<br>January 26-30, 2015
<br>InterContinental San Juan, Puerto Rico
<br>http://fc15.ifca.ai/
<br>
<br>Call for Papers
<br>
<br>Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on financial, economic and commercial transaction security. Original works focusing on securing commercial transactions and systems are solicited; fundamental as well as applied real-world deployments on all aspects surrounding commerce security are of interest. Submissions need not be exclusively concerned with cryptography. Systems security, economic or behavioral perspectives, and, more generally, inter-disciplinary efforts are particularly encouraged.
<br>
<br>Topics of interests include, but are not limited to:
<br>
<br>Access Control
<br>Anonymity and Privacy
<br>A...
Read more
Financial Cryptography and Data Security (FC15)
<br>19th International Conference
<br>January 26-30, 2015
<br>InterContinental San Juan, Puerto Rico
<br>http://fc15.ifca.ai/
<br>
<br>Call for Papers
<br>
<br>Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on financial, economic and commercial transaction security. Original works focusing on securing commercial transactions and systems are solicited; fundamental as well as applied real-world deployments on all aspects surrounding commerce security are of interest. Submissions need not be exclusively concerned with cryptography. Systems security, economic or behavioral perspectives, and, more generally, inter-disciplinary efforts are particularly encouraged.
<br>
<br>Topics of interests include, but are not limited to:
<br>
<br>Access Control
<br>Anonymity and Privacy
<br>Applied Cryptography
<br>Auctions and Mechanisms
<br>Authentication and Identification
<br>Behavioral Aspects of Security and Privacy
<br>Biometrics
<br>Certification and Audits
<br>Cloud Computing and Data Outsourcing Security
<br>Commercial Cryptographic Applications
<br>Contactless Payment and Ticketing Systems
<br>Cryptographic Currencies
<br>Digital Cash and Payment Systems
<br>Digital Rights Management
<br>Economics of Security and Privacy
<br>Electronic Commerce Security
<br>Electronic Crime and Underground Markets
<br>Fraud Detection and Forensics
<br>Game Theory for Security and Privacy
<br>Identity Theft
<br>Insider Threats
<br>Legal and Regulatory Issues
<br>Microfinance and Micropayments
<br>Mobile Systems Security and Privacy
<br>Phishing and Social Engineering
<br>Reputation Systems
<br>Risk Assessment and Management
<br>Secure Banking and Financial Services
<br>Smart Contracts and Financial Instruments
<br>Smartcards, Secure Tokens and Secure Hardware
<br>Social Networks Security and Privacy
<br>Trust Management
<br>Usability and Security
<br>Virtual Goods and Virtual Economies
<br>Voting Systems
<br>Web Security
<br>
<br>
<br>Important Dates
<br>
<br>Workshop Proposal Submission ... August 1, 2014
<br>Workshop Proposal Notification ... August 15, 2014
<br>Paper Submission Deadline ... September 15, 2014, 23:59 UTC (firm)
<br>Author Notification ... November 16, 2014
<br>Final Papers ... December 31, 2014
<br>Poster and Panel Submission ... November 24, 2014
<br>Poster and Panel Notification ... December 7, 2014
<br>
<br>Conference ... January 26-30, 2015
<br>
<br>
<br>Submission
<br>
<br>Submissions are sought in the following categories:
<br>(i) regular papers (15 pages LNCS format excluding references and appendices),
<br>(ii) short papers (8 pages LNCS format in total),
<br>(iii) panel and workshop proposals (2 pages), and
<br>(iv) posters (1 page).
<br>
<br>The regular and short paper submissions must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. In contrast, panel, workshop proposal, and poster submissions must include author names and affiliations.
<br>
<br>Papers must be formatted in standard LNCS format and submitted as PDF files. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found here and at the submission site. For each accepted paper the conference requires at least one registration at the general or academic rate.
<br>
<br>Authors may only submit work that does not substantially overlap with work that is currently submitted or has been accepted for publication to a conference/workshop with proceedings or a journal. We consider double submission serious research fraud and will treat it as such. In case of doubt contact the program chairs for any clarifications at
<br>fc15chair@ifca.ai.
<br>
<br>
<br>Regular Research Papers
<br>
<br>Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages excluding references and appendices. A total page restriction may apply for the printed proceedings version. Committee members are not required to read the appendices, so the full papers should be intelligible without them. Regular papers must be anonymous with no author names, affiliations, acknowledgements, or obvious references.
<br>
<br>
<br>Short Papers
<br>
<br>Short papers are also subject to peer review, however, the intention is to encourage authors to introduce work in progress, novel applications and corporate/industrial experiences. Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues. Short paper submissions are limited to 8 pages in standard LNCS format in total. The paper title for short papers should necessarily include the text "Short Paper." Accepted submissions will be included in the conference proceedings. Short papers must be anonymous with no author names, affiliations, acknowledgements, or obvious references.
<br>
<br>
<br>Panel Proposals
<br>
<br>We especially would like to encourage submissions of panel proposals. These should include a very brief description of the panel topics, as well as of the prospective panelists. Accepted panel sessions will be presented at the conference. Moreover, each participant will contribute a one-page abstract to be published in the conference proceedings. Please feel free to contact us directly if you would like to further discuss the suitability of a certain topic. Panel submissions must not be anonymous and should be up to 2 pages, sent to fc15chair@ifca.ai.
<br>
<br>
<br>Posters
<br>
<br>The poster session is the perfect venue to share a provocative opinion, interesting established or preliminary work, or a cool idea that will spark discussion. Poster presenters will benefit from a multi-hour session to discuss their work, get exposure, and receive feedback from attendees. Poster submissions should be a 1-page abstract (in the same LNCS format) describing the poster. Please keep in mind that the poster deadline is later than the main paper submission deadline. The poster abstracts will be published in the proceedings. Poster proposals must not be anonymous and should be sent to the posters chair at fc15chair@ifca.ai.
<br>
<br>
<br>Workshop Proposals
<br>
<br>Proposals for workshops to be held at FC15 are also solicited. A workshop can be full day or half day in length. Workshop proposals should include: (i) a title, (ii) a call for papers, (iii) a brief summary and justification - including how it would fit into the greater FC scope, (iv) a (tentative) Program Committee and its Chair, (v) one-paragraph biographies for key organizers, and (vi) the expected (or previous - if workshop has been held in previous years) number of submissions, participants and acceptance rates. Workshop proposals must not be anonymous and should be sent to fc15workshops@ifca.ai.
<br>
<br>
<br>The Rump Session
<br>
<br>FC15 will also include the popular "rump session" held on one of the evenings in an informal, social atmosphere. The rump session is a program of short (5 minutes), informal presentations on works in progress, off-the-cuff ideas, and any other matters pertinent to the conference. Any conference attendee is welcome to submit a presentation to the Rump Session Chair (to be announced at the conference). This submission should consist of a talk title, the name of the presenter, and, if desired, a very brief abstract. Submissions may be sent via e-mail, or submitted in person in the morning on the day of the session.
<br>
<br>
<br>Student Stipends
<br>
<br>We are pleased to announce the availability of enhanced financial support for students attending FC15. We anticipate awarding student stipends that would cover conference registration fees and reimburse travel expenses up to $1,000. Preference will be given to students who will be presenting at the conference or associated workshops, but all student participants are encouraged to apply. If you are interested in applying for stipend support, please email the FC15 general chair at fc15general@ifca.ai with subject line "student stipend" and a letter of support from your home institution.
<br>
<br>
<br>Organizers
<br>
<br>General Chair ... Joseph Bonneau, Princeton University, USA
<br>Local Arrangements Chair ... Rafael Hirschfeld, Unipay Technologies, Netherlands
<br>
<br>Program Chairs ... Rainer Boehme, University of Muenster, Germany
<br>... Tatsuaki Okamoto, NTT, Japan
<br>
<br>Program Committee
<br>
<br>Ross Anderson, University of Cambridge, UK
<br>Giuseppe Ateniese, Sapienza University of Rome, Italy
<br>Alvaro Cardenas, UT Dallas, USA
<br>Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
<br>Nicolas Christin, Carnegie Mellon University, USA
<br>Emiliano De Cristofaro, University College London, UK
<br>Roberto Di Pietro, Bell Labs, France
<br>Serge Egelman, UC Berkeley / ICSI, USA
<br>William Enck, North Carolina State University, USA
<br>Martin Gagne, Wheaton College, USA
<br>Matthew Green, Johns Hopkins University, USA
<br>Jens Grossklags, Pennsylvania State University, USA
<br>Boris Hemkemeier, Commerzbank AG, Germany
<br>Urs Hengartner, University of Waterloo, Canada
<br>Nadia Heninger, University of Pennsylvania, USA
<br>Nicholas Hopper, University of Minnesota, USA
<br>Benjamin Johnson, Carnegie Mellon University, USA
<br>Stefan Katzenbeisser, TU Darmstadt, Germany
<br>Andrew Ker, University of Oxford, UK
<br>Florian Kerschbaum, SAP AG, Germany
<br>Aggelos Kiayias, University of Athens, Greece
<br>Tadayoshi Kohno, University of Washington, USA
<br>Anja Lehmann, IBM Research Zurich, Switzerland
<br>Helger Lipmaa, University of Tartu, Estonia
<br>Stefan Lucks, Bauhaus-Universität Weimar, Germany
<br>David M'Raihi, Perzo, Inc., USA
<br>Mark Manulis, University of Surrey, UK
<br>Kanta Matsuura, University of Tokyo, Japan
<br>Catherine Meadows, Naval Research Laboratory, USA
<br>Sarah Meiklejohn, University College London, UK
<br>Refik Molva, EURECOM, France
<br>Tyler Moore, Southern Methodist University, USA
<br>Arvind Narayanan, Princeton University, USA
<br>Satoshi Obana, Hosei University, Japan
<br>Claudio Orlandi, Aarhus University, Denmark
<br>Roberto Perdisci, University of Georgia, USA
<br>Josef Pieprzyk, Queensland University of Technology, Australia
<br>Bart Preneel, Katholieke Universiteit Leuven, Belgium
<br>Ahmad-Reza Sadeghi, TU Darmstadt, Germany
<br>Rei Safavi-Naini, University of Calgary, Canada
<br>Pierangela Samarati, Universita' degli Studi di Milano, Italy
<br>Thomas Schneider, TU Darmstadt, Germany
<br>Gil Segev, Hebrew University, Israel
<br>Emin Gun Sirer, Cornell University, USA
<br>Carmela Troncoso, Gradiant, Spain
<br>Doug Tygar, UC Berkeley, USA
<br>Serge Vaudenay, EPFL Lausanne, Switzerland
<br>Huaxiong Wang, Nanyang Technological University, Singapore
<br>Ralf-Philipp Weinmann, Comsecuris UG, Germany
<br>Akira Yamada, KDDI, Japan
<br>Jianying Zhou, Institute for Infocomm Research, Singapore
<br>
<br>This conference is organized annually by the International Financial Cryptography Association.