Call for Papers
Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2024 conference.
SSR also invites Systematisation of Knowledge (SoK) papers relating to security standardisation, which integrate experience and previous research, drawing new comprehensive conclusions. SoK papers should evaluate, systematise, and contextualise existing knowledge. They should provide a new viewpoint, offer a comprehensive taxonomy, or cast doubt on long-held beliefs, based on compelling evidence. We also welcome SoK papers that document existing standardisation practices and analyse their weaknesses and strengths.
We also encourage submission of vision papers relating to security standardisation. The vision track is intended to report on work in progress or concrete ideas for work that has yet to begin. The focus in the vision track is to spark discussion with the goal to provide the authors helpful feedback, pointers to potentially related investigations, and new ideas to explore. Suitable submissions to the vision track include traditional work-in-progress pieces such as preliminary results of pre-studies, but also research proposals and position papers outlining future research.
Topics
Papers may present theory, applications or practical experience in the field of security standardisation, including, but not limited to:
- Access control
- Biometrics
- Blockchain
- Cloud computing security/privacy
- Critical national infrastructure protection
- Cryptanalysis
- Cryptographic protocols
- Cryptographic techniques
- Data protection and law/regulation
- Digital trust
- Evaluation criteria
- Formal analysis of standards
- History of standardization
- Identity management
- Industrial control systems security
- Internet of things security/privacy
- Internet security
- Interoperability of standards
- Intrusion detection
- Key management and PKIs
- Mobile security
- Network security
- Open standards and open source
- Payment system security
- Post-quantum security
- Privacy regional and international standards
- RFID tag security
- Risk analysis
- Secure messaging
- Secure voting techniques
- Security controls
- Security management
- Security protocols
- Security services
- Security tokens
- Smart cards
- Standardisation process management
- Standards consistency and comparison critiques of standards
- Telecommunications security
- Tools for security protocol validation
- Trusted computing
- Usability
- Web security
Submission Guidelines
Submitted papers must be original, unpublished, anonymous and not submitted to journals or other conferences/workshops that have proceedings. Submissions must be written in English and should be at most 23 pages in the Springer LCNS format including references, but not counting appendices. Authors should consult Springer’s authors’ guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Papers not meeting these guidelines risk rejection without consideration. All submitted papers will be reviewed by at least three members of the program committee.
Authors submitting a systematisation of knowledge paper should have a title starting with “SoK: ”. This is to ensure that the committee is made aware that the paper is an SoK paper, and so will be reviewed with different criteria. Vision papers should be marked as such upon submission.
Accepted papers will be published via Springer’s Lecture Notes in Computer Science (LNCS). Authors of accepted papers must complete and sign a Consent-to-Publish form. At least one author of each accepted paper must register for the conference.
Submission Server
The submission server is open and can be accessed here. The submission server closes 15 September 2024 (Sunday), Anywhere on Earth (AoE = UTC-12h).
Program Committee
- Benjamin Dowling (University of Sheffield, UK)
- Thalia Laing (HP Security Lab, Bristol, UK)
- Shin'ichiro Matsuo (Georgetown University, USA)
- Christopher Patton (Cloudflare)
- Kazue Sako (Waseda University, Japan)
- Christoph Striecks (AIT Austrian Institute of Technology)
- Mathy Vanhoef (Katholieke Universiteit Leuven, Belgium)
- Gaven J. Watson (Meta)
- Kazuki Yoneyama (Ibaraki University, Japan)
- Guilin Wang (Huawei International Pte Ltd, Singapore)
- Benjamin Curtis (Zama)
- Gaetan Pradel (Incert, Luxembourg)
- Christian Weinert (Royal Holloway, UK)
- Yu Yu (Shanghai Jiao Tong University, China)
- Stephan Krenn (AIT Austrian Institute of Technology GmbH)
- Yanbin Pan (Academy of Mathematics and Systems Science, CAS, China)
- Jacques Traore (Orange Labs)
- Aysajan Abidin (COSIC KU Leuven, Belgium)
- Zhaohui Cheng (Olym Info. Sec. Inc., China)
- Lily Chen (NIST, USA)
- Huijing Gong (Intel Labs)
- Yu Chen (School of Cyber Science and Technology, Shandong University, China)
- Alan Sherman (University of Maryland, Baltimore County, USA)
- Matt Henricksen (Huawei International Pte Ltd, Singapore)
- Bertram Poettering (IBM Research - Zurich)
- Sofía Celi (Brave)
General Chair
- Guilin Wang (Huawei International Pte Ltd, Singapore)
PC Co-Chairs
- Xianhui Lu (Institute of Information Engineering, CAS, China)
- Chris Mitchell (Royal Holloway, UK)
Organizing Chair
- Limin Liu (Institute of Information Engineering, CAS, China)
Publicity Chair
- Limin Liu (Institute of Information Engineering, CAS, China)