Call for Papers
Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2023 conference.
SSR also invites Systematisation of Knowledge (SoK) papers relating to security standardisation, which integrate experience and previous research, drawing new comprehensive conclusions. SoK papers should evaluate, systematise, and contextualise existing knowledge. They should provide a new viewpoint, offer a comprehensive taxonomy, or cast doubt on long-held beliefs, based on compelling evidence. We also welcome SoK papers that document existing standardisation practices and analyse their weaknesses and strengths.
We also encourage submission of vision papers relating to security standardisation. The vision track is intended to report on work in progress or concrete ideas for work that has yet to begin. The focus in the vision track is to spark discussion with the goal to provide the authors helpful feedback, pointers to potentially related investigations, and new ideas to explore. Suitable submissions to the vision track include traditional work-in-progress pieces such as preliminary results of pre-studies, but also research proposals and position papers outlining future research.
Topics
Papers may present theory, applications or practical experience in the field of security standardisation, including, but not limited to:
- Access control
- Biometrics
- Blockchain
- Cloud computing security/privacy
- Critical national infrastructure protection
- Standards consistency and comparison critiques of standards
- Cryptanalysis
- Cryptographic protocols
- Cryptographic techniques
- Data protection and law/regulation
- Digital trust
- Evaluation criteria
- Formal analysis of standards
- History of standardization
- Identity management
- Industrial control systems security
- Internet of things security/privacy
- Internet security
- Interoperability of standards
- Intrusion detection
- Key management and PKIs
- Standardisation process management
- Mobile security
- Network security
- Open standards and open source
- Payment system security
- Post-quantum security
- Privacy regional and international standards
- RFID tag security
- Risk analysis
- Secure messaging
- Security controls
- Security management
- Security protocols
- Security services
- Security tokens
- Smart cards
- Telecommunications security
- Trusted computing
- Usability
- Web security
Submission Guidelines
Submitted papers must be original, unpublished, anonymous and not submitted to journals or other conferences/workshops that have proceedings. Submissions must be written in English and should be at most 23 pages in the Springer LCNS format including references, but not counting appendices. Authors should consult Springer’s authors’ guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Papers not meeting these guidelines risk rejection without consideration. All submitted papers will be reviewed by at least three members of the program committee.
Authors submitting a systematisation of knowledge paper should have a title starting with “SoK: ”. This is to ensure that the committee is made aware that the paper is an SoK paper, and so will be reviewed with different criteria. Vision papers should be marked as such upon submission.
Accepted papers will be published via Springer’s Lecture Notes in Computer Science (LNCS). Authors of accepted papers must complete and sign a Consent-to-Publish form. At least one author of each accepted paper must register for the conference.
Submission Server
The submission server is open and can be accessed here. The submission server closes [Deadline extended] 12 January 2023 (Thursday), Anywhere on Earth (AoE = UTC-12h).
Program Committee
- Nina Bindel (SandboxAQ, Palo Alto, CA, USA)
- Joppe Bos (NXP Semiconductors, Belgium)
- Sofía Celi (Brave)
- Gareth T. Davies (Bergische Universität Wuppertal, Germany)
- Jean Paul Degabriele (Cryptography Research Center in TII, U.A.E.)
- Benjamin Dowling (University of Sheffield, UK)
- Marc Fischlin (TU Darmstadt, Germany)
- Scott Fluhrer (Cisco Systems)
- Britta Hale (Naval Postgraduate School, CA, USA)
- Christian Janson (TU Darmstadt, Germany)
- Saqib A. Kakvi (Royal Holloway, University of London)
- John Kelsey (NIST, USA)
- Markulf Kohlweiss (University of Edinburgh, UK, and IOHK)
- Thalia Laing (HP Inc., CA, USA)
- Giorgia Azzurra Marson (NEC, Germany)
- Shin'ichiro Matsuo (Georgetown University, USA)
- Catherine Meadows (Naval Research Laboratory, USA)
- Maryam Mehrnezhad (Royal Holloway, UK)
- Chris Mitchell (Royal Holloway, UK)
- Elisabeth Oswald (University of Klagenfurt, Austria)
- Kenneth Paterson (ETH Zurich, Switzerland)
- Christopher Patton (Cloudflare)
- Bertram Poettering (IBM Research - Zurich)
- Kazue Sako (Waseda University, Japan)
- Stanislav Smyshlyaev (CryptoPro)
- Christoph Striecks (AIT Austrian Institute of Technology)
- Thyla van der Merwe (Google, Zurich, Switzerland)
- Mathy Vanhoef (Katholieke Universiteit Leuven, Belgium)
- Gaven J. Watson (Meta)
- Christopher Wood (Cloudflare)
- Kazuki Yoneyama (Ibaraki University, Japan)
Organizers & PC Co-Chairs
- Felix Günther (ETH Zurich, Switzerland)
- Julia Hesse (IBM Research Europe – Zurich, Switzerland)