Dear colleagues,
I am happy to announce the second talk of the NetSec Lecture Series [1]
that is organized by the GI Netsec working group [2]. On May 19th, 5pm
(CEST), Jens Hiller from RWTH Aachen will tell a story of
experimentation and centralization: Tracking the deployment of TLS 1.3
on the Web.
----------------------------------------------------
May 19, 5pm (CEST), Jens Hiller (RWTH Aachen)
Join via Zoom:
https://tu-berlin.zoom.us/j/63223549564?pwd=SUdRSjcvVzJJeVhielM0UE5pNGhlQT09
<https://tu-berlin.zoom.us/j/63223549564?pwd=SUdRSjcvVzJJeVhielM0UE5pNGhlQT09>
**Tracking the deployment of TLS 1.3 on the Web: A story of
experimentation and centralization**
*Abstract:* Transport Layer Security is the most important security
protocol on the Web. Before the standardization of its newest version
TLS 1.3 in August 2018, the protocol was redesigned over four years in a
yet unprecedented design process that involved many cryptographers and
key industry stakeholders. Based on the combination of active Internet
scans, and passive measurements in large networks and on Android
devices, we will look at how large stakeholders experimented with the
protocol in the Internet well before its standardization. Their
experiments uncovered incompatibilities that influenced the ongoing
standardization process. Also, we will analyze the uptake of this
mission-critical security protocol after its standardization. In
contrast to TLS 1.2, where adoption took more than five years and was
prompted by severe attacks on previous versions, TLS 1.3 is deployed
surprisingly speedily. The design process thus provides valuable
information for future protocol design and deployment.
*CV:* Jens Hiller is Researcher and PhD Student at the Chair of
Communication and Distributed Systems (COMSYS) at RWTH Aachen
University. His research interests revolve around today's prominent
secure communication protocols and security and privacy for the Internet
of Things. He also spent two summer research stays at the International
Computer Science Institute (ICSI) in Berkely analyzing the security of
the Web's Internet Public Key Infrastructure.
----------------------------------------------------
Dates in the NetSec Lecture Series
---------------------------------------------------
*April 21st (English):* Dr. Robin Sommer, Corelight - "Transition To
Practice, They Say: How Two Decades of Security Research Ultimately
Spawned a Silicon Valley Startup"
*May 19th (English):* Jens Hiller, RWTH Aachen - "Tracking the
deployment of TLS 1.3 on the Web: A story of experimentation and
centralization"
*June 15th (English):* Prof. Dr. Andreas Peter, Universität Oldenburg -
"DEEPCASE: Semi-Supervised Contextual Analysis of Security Events"
*July (German):* Panel "Right to Encryption"
---------------------------------------------------
Best,
The steering committee of the NetSec working group
[1]
https://fg-netsec.gi.de/veranstaltung/netsec-lecture-series-tracking-the-de…
<https://fg-netsec.gi.de/veranstaltung/netsec-lecture-series-tracking-the-de…>
[2] https://fg-netsec.gi.de/
Dear colleagues,
I am happy to announce the NetSec Lecture Series [1] that is organized
by the GI Netsec working group [2]. The first digital talk in the series
is on April 21st, 5pm (CEST) and our first speaker is Dr. Robin Sommer
from Corelight.
----------------------------------------------------
April 21st, 5pm (CEST), Dr. Robin Sommer (Corelight)
Join via Zoom:
https://tu-berlin.zoom.us/j/63223549564?pwd=SUdRSjcvVzJJeVhielM0UE5pNGhlQT09
*Transition To Practice, They Say: How Two Decades of Security Research
Ultimately Spawned a Silicon Valley Startup*
*Abstract:* In academia, it can require perseverance and patience to see
your research gaining real-world traction. In this presentation we will
recap the journey that turned the open source network security monitor
Zeek (formerly Bro) from a little known research platform into a
powerful operational security tool that’s now helping protect some of
the largest, most sensitive organizations. Over a period of more than
two decades, Zeek went through a series of quite distinct phases (as
well as a couple of near-death experiences) that, in hindsight, all
proved critical to exploit the full potential of the original
technology. Today, the Zeek project is thriving more than ever: An
active open source community continues to extend the system’s
capabilities, while a venture-backed startup founded by its creators
provides turn-key products to large enterprises and government
organizations.
*CV:* Robin Sommer is a Co-Founder at Corelight, a San Francisco-based
security startup providing open NDR solutions based on Zeek. He has been
leading the development team behind Zeek for many years. Before
Corelight, Robin was a Senior Researcher at the International Computer
Science Institute (ICSI) in Berkeley, California, where he led a range
of research projects on network security and privacy. Robin has served
on numerous review committees for academic conferences and funding
organizations, and as the General Chair for the 2013 IEEE Security &
Privacy Symposium. He holds a doctorate degree from the Technical
University of Munich, Germany, and is now back living in Munich as well,
from where he continues to lead Corelight’s open source development team.
----------------------------------------------------
Dates in the NetSec Lecture Series
---------------------------------------------------
*April 21st (English):* Dr. Robin Sommer, Corlight - "Transition To
Practice, They Say: How Two Decades of Security Research Ultimately
Spawned a Silicon Valley Startup"
*May (English):* Jens Hiller, RWTH Aachen
*June 15th (English):* Prof. Dr. Andreas Peter, Universität Oldenburg
*July (German):* Panel "Right to Encryption"
---------------------------------------------------
Best,
The steering committee of the NetSec working group
[1] https://gi.de/veranstaltung/netsec-lecture-series
[2] https://fg-netsec.gi.de/
Liebe Kolleginnen und Kollegen,
pünktlich zu Ostern ein kleines Geschenk der Fachgruppe NetSec: die
digitale "NetSec Lecture Series" im Sommersemester.
https://fg-netsec.gi.de/veranstaltung/netsec-lecture-series
Die erste Veranstaltung findet am 21. April von 17-18:30 Uhr über Zoom
statt. Unser erster Vortragender ist Dr. Robin Sommer (Corelight), der
über die Reise des Open-Source-IDS Zeek von einem akademischen
Forschungsprojekt hin zu einem Silicon-Valley-Startup referieren wird.
Termine in der NetSec Lecture Series
---------------------------------------------------
*21. April 2022:* Dr. Robin Sommer, Corlight - "Transition To Practice,
They Say: How Two Decades of Security Research Ultimately Spawned a
Silicon Valley Startup"
*Mai 2022:* Jens Hiller, RWTH Aachen
*15. Juni:* Prof. Dr. Andreas Peter, Universität Oldenburg
*Juli 2022:* Podiumsdiskussion zum Thema "Recht auf Verschlüsselung"
---------------------------------------------------
Die Zoom-Einwahldaten für die Veranstaltung sind:
https://tu-berlin.zoom.us/j/63223549564?pwd=SUdRSjcvVzJJeVhielM0UE5pNGhlQT09
Erster Talk am 21. April 2022, 17 Uhr:
----------------------------------------------------
*Transition To Practice, They Say: How Two Decades of Security Research
Ultimately Spawned a Silicon Valley Startup*
*Abstract:* In academia, it can require perseverance and patience to see
your research gaining real-world traction. In this presentation we will
recap the journey that turned the open source network security monitor
Zeek (formerly Bro) from a little known research platform into a
powerful operational security tool that’s now helping protect some of
the largest, most sensitive organizations. Over a period of more than
two decades, Zeek went through a series of quite distinct phases (as
well as a couple of near-death experiences) that, in hindsight, all
proved critical to exploit the full potential of the original
technology. Today, the Zeek project is thriving more than ever: An
active open source community continues to extend the system’s
capabilities, while a venture-backed startup founded by its creators
provides turn-key products to large enterprises and government
organizations.
*CV:* Robin Sommer is a Co-Founder at Corelight, a San Francisco-based
security startup providing open NDR solutions based on Zeek. He has been
leading the development team behind Zeek for many years. Before
Corelight, Robin was a Senior Researcher at the International Computer
Science Institute (ICSI) in Berkeley, California, where he led a range
of research projects on network security and privacy. Robin has served
on numerous review committees for academic conferences and funding
organizations, and as the General Chair for the 2013 IEEE Security &
Privacy Symposium. He holds a doctorate degree from the Technical
University of Munich, Germany, and is now back living in Munich as well,
from where he continues to lead Corelight’s open source development team.
--------------------------------------------------------------------------------------------------------------
Viele Grüße
Das Leitungsgremium und Freunde der FG NetSec
Dear colleagues,
ENISA, DG CONNECT, the Cardinal Stefan Wyszyński University and the Koźmiński University are organizing the Annual Privacy Forum (APF) 2022 on 23-24 June 2022 in Warsaw, Poland.
**Important dates**
- Submission of full papers: 21 February 2022 23:59 GMT
- Notification to author(s): 17 March 2022
- Camera-ready versions: 7 April 2022
In APF 2022, we invite papers presenting original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement. An inter-disciplinary approach is high in demand to contribute to bridging the gap between research, business models and policy, much like proposing new models and interpretations.
Additional information on the event and the call for papers are available under https://privacyforum.eu/call-for-papers
Submission can be made through Easychair at https://easychair.org/my/conference?conf=apf2022
On behalf of the PC Chairs,
P.D.
---
Dr. Prokopios Drogkaris
Cybersecurity Expert - Policy Development and Implementation
European Union Agency for Cybersecurity (ENISA)
Phone: (+30) 2814 409 650
Mobile: (+30) 6973 399 328
Email: Prokopios.Drogkaris(a)enisa.europa.eu
Sehr geehrte Damen und Herren,
die GI-Fachgruppe NETSEC lädt ein zum
** Workshop: Ende-zu-Ende-Verschlüsselung **
am Mittwoch, den 29. Juli 2020, von 16 Uhr bis 19 Uhr, online via Zoom.
Die Teilnahme ist kostenfrei. Um Anmeldung unter https://fg-netsec.gi.de/veranstaltung/workshop-ende-zu-ende-verschluesselung wird gebeten.
Messenger- und Video-Konferenz-Dienste sind sowohl im Privatleben als auch in Firmen unabdingbar geworden. Sie sind bedeutende Kommunikationskanäle, über die private Nachrichten oder Firmeninterna ausgetauscht werden. Daher stellt sich unmittelbar die Frage nach dem Datenschutz und der Datensicherheit. Insbesondere das Thema Ende-zu-Ende-Verschlüsselung wird oft vorgebracht und polarisiert. Es gibt funktionale und nichtfunktionale Argumente, die auf technischer und politischer Ebene für oder gegen Ende-zu-Ende-Verschlüsselung sprechen.
Zu dem Workshop tragen Vertreter*innen unterschiedlicher Standpunkte ihre Sichtweise bei. Gemeinsam wollen wir anschließend Pros und Kontras von Ende-zu-Ende-Verschlüsselung diskutieren und auf diese Weise eine Meinungsbildung unter den Teilnehmer*innen fördern.
Bitte reichen Sie diese Ankündigung an interessierte Kolleginnen und Kollegen weiter. Ein ausführliches Programm finden Sie unter https://fg-netsec.gi.de/veranstaltung/workshop-ende-zu-ende-verschluesselung.
Mit freundlichem Grüßen
Monina Schwarz und Matthias Marx
--
Matthias Marx
Tel: +49-40-42883-2344 - https://svs.informatik.uni-hamburg.de/
Universität Hamburg - FB Informatik - Sicherheit in Verteilten Systemen
Sehr geehrte Damen und Herren,
die GI-Fachgruppe NETSEC lädt ein zum
** Thementag Hardwaresicherheit **
am Freitag, den 25. Oktober 2019, von 13 Uhr bis 17 Uhr
im Einstein Center Digital Future, Robert-Koch-Forum, Wilhelmstraße 67,
10117 Berlin.
Die Teilnahme ist kostenfrei. Um Anmeldung unter
https://fg-netsec.gi.de/veranstaltung/thementag-sichere-hardware/ wird
gebeten.
Auf unserer letzten Veranstaltung haben wir uns damit befasst, dass
immer mehr virtuelle und physische Gegenstände in allen Bereichen
unserer Lebens- und Arbeitswelt miteinander vernetzt werden. Die
Grundlage dieser Vernetzung bildet eine moderne und sichere
(Netz-)Infrastruktur. Der Schwerpunkt unseres zweiten Thementages ist
die Hardware, die für solche Infrastrukturen benötigt wird. Die
Veranstaltung beginnt mit Vorträgen über sichere Systeme für eine
verlässliche Digitalisierung, über Messsysteme für kritische
Infrastruktur und über Fingerprinting von CAN-Bussen. Danach folgen
Kurzvorträge zu aktuellen Highlights aus der Forschung. Abschließend
gibt es Gelegenheit zum Austausch, zur Diskussion und zum Netzwerken.
Ein ausführliches Programm gibt es unter
https://fg-netsec.gi.de/veranstaltung/thementag-sichere-hardware/.
Wir würden uns sehr freuen, Sie dort begrüßen zu dürfen. Bitte reichen
Sie diese Ankündigung an interessierte Kolleginnen und Kollegen weiter.
Mit freundlichem Grüßen
Monina Schwarz und Matthias Marx für die GI-Fachgruppe NETSEC
--
Matthias Marx
Tel: +49-40-42883-2344 - https://svs.informatik.uni-hamburg.de/
Universität Hamburg - FB Informatik - Sicherheit in Verteilten Systemen
Sehr geehrte Damen und Herren,
die GI-Fachgruppe NETSEC sowie die Hamburger Dialogplattform Industrie
4.0 in Kooperation mit der Universität Hamburg, dem Industrieverband
Hamburg sowie dem Hamburger Unternehmen Simplexion laden ein zum
** Thementag Sicherheit in Intelligenten Netzen und IoT **
am Montag, den 18. März 2019, von 14 Uhr bis 20 Uhr
in der Handelskammer Hamburg, Alster-Zimmer, Adolphsplatz 1, 20457 Hamburg.
Die Teilnahme ist kostenfrei. Um Anmeldung unter
https://fg-netsec.gi.de/veranstaltung/thementag-sicherheit-in-intelligenten…
wird gebeten.
Die zunehmende Vernetzung von virtuellen und physischen Gegenständen in
allen Bereichen unserer Lebens- und Arbeitswelt führt zu neuen
Sicherheitsrisiken. Nicht nur Alltagsgegenstände, sondern ganze
Industrieanlagen und Maschinen werden vernetzt. Sensible Daten können
verloren gehen oder Produktionsstraßen für Wochen lahmgelegt werden.
In den ersten Vorträgen werden Vertreter aus Industrie und Forschung
über Sicherheit in Bahnnetzen, über den Wandel der Stromnetze und über
resiliente Netze, die bei einem Ausfall von Teilsystemen nicht
vollständig versagen, berichten.
In den anschließenden Vorträgen und Keynotes mit dem Schwerpunkt IoT
werden die Themen Context-Aware Authentication, Anforderungen an die
Datensicherheit und Datensicherheit in der Geräteentwicklung behandelt.
Die Veranstaltung schließt mit einem Get-together und bietet Gelegenheit
zum Austausch, zu Diskussion und zum Netzwerken.
Bitte reichen Sie diese Ankündigung an interessierte Kolleginnen und
Kollegen weiter. Ein ausführliches Programm finden Sie unter
https://fg-netsec.gi.de/veranstaltung/thementag-sicherheit-in-intelligenten….
Mit freundlichen Grüßen
Matthias Marx
--
Matthias Marx
Tel: +49-40-42883-2344 - https://svs.informatik.uni-hamburg.de/
Universität Hamburg - FB Informatik - Sicherheit in Verteilten Systemen
=====================================================================
Die Fachgruppen PET und ECOM der Gesellschaft für Informatik und
das Center for Research in Security and Privacy (CRISP) laden ein zum
Workshop
Online-Tracking: Lösungen für mehr Transparenz und besseren Schutz
am 4. Oktober 2017 von 14 bis 18 Uhr in Darmstadt.
=====================================================================
Veranstaltungsort:
Fraunhofer-Institut für Sichere Informationstechnologie (SIT)
Rheinstraße 75, 64295 Darmstadt – Raum „Berlin“
Zum Inhalt:
Ein für den Nutzer unsichtbares Online-Tracking und Profiling ist im
Web heute gängige Praxis. Was macht Online-Tracking so attraktiv? Wie
sieht die Technik dahinter aus? Wie kann man sich mit möglichst
geringem Aufwand möglichst zuverlässig vor Tracking schützen? Der
Workshop soll Antworten auf diese Fragen geben. Wissenschaftler und
Praktiker führen in die Thematik ein, erklären die technischen und
organisatorischen Abläufe und stellen sowohl rechtliche als auch
technische Möglichkeiten vor, um sich als Nutzer im Sinne eines
Selbstdatenschutzes zur Wehr zu setzen. Darüber hinaus wird
erläutert, wie man die Verwendung von Tracking-Techniken
nachvollziehen und vergleichen kann. Die Veranstaltung endet mit
einer Podiumsdiskussion, in der erörtert werden soll, wie
datenschutzfreundlichere Smartphone-Apps und Webseiten in Zukunft
realisiert werden könnten und was die Folgen davon wären.
Vortragsprogramm:
* Der Preis des Kostenlosen // Prof. Dr. P. Buxmann, TU Darmstadt
* Online-Tracking und Datenschutzrecht // L. Konzelmann, Referent
beim Sächsischen Datenschutzbeauftragten
* Technik des Trackings // C. Bennefeld, Gründer und Geschäftsführer
der eBlocker GmbH (Hersteller einer Privacy-Box)
* Rechtliche Probleme beim Blocken von Tracking und Werbung
Dr. J. Nink, Data Protection Officer und Legal Counsel der eyeo GmbH
(Hersteller des Browser-Plugins „AdBlock Plus“)
* PrivacyScore.org: Tracking im Internet sichtbar gemacht
Dr. D. Herrmann (Universität Hamburg)
* Podiumsdiskussion mit den Referenten und weiteren Gästen
In den Pausen und im Anschluss besteht die Gelegenheit zum
Erfahrungsaustausch und zur Vernetzung. Weitere Details zur Anfahrt,
und zum Ablauf sowie ein Formular zur unverbindlichen Anmeldung
finden Sie unter
https://fg-pet.gi.de/tracking.html
Organisation:
Diese Veranstaltung wird von den Fachgruppen PET und ECOM des
Fachbereichs „Sicherheit, Schutz und Zuverlässigkeit“ der
Gesellschaft für Informatik sowie CRISP – Center for Research in
Security and Privacy organisiert.
Ansprechpartner und Kontakt:
Andreas Heinemann (Sprecher der Fachgruppe ECOM)
Dominik Herrmann und Sebastian Pape (Sprecher der FG PET)
Kontaktadressen: https://fg-pet.gi.de/tracking.html
Update: Submission deadline has been extended by one week.
**********************************************************************
CALL FOR PARTICIPATION
*********************************************************************
7th Privacy Enhancing Techniques Convention: PET-CON 2017.2
11–12 September 2017
University of Hamburg, East Wing, ESA O 222
Edmund-Siemers-Allee 1, Hamburg, Germany
http://pet-con.de/
**********************************************************************
We invite you to attend PET-CON 2017.2 -- the seventh convention in
Germany in the area of Privacy Enhancing Techniques. PET-CON brings
together students (B.Sc., M.Sc., PhD), junior researchers, privacy
activists and other interested people to discuss work in progress.
PET-CON is organized by the PET interest group of the German Computer
Science Society (GI). Previous PET-CONs took place at University of
Regensburg, TU Dresden, TU Darmstadt, RWTH Aachen, and Goethe
University Frankfurt.
PET-CON is a very informal gathering. The workshop consists of
short contributed talks (10-15 minutes) followed by extensive
feedback and discussions (up to 45 minutes). For instance, students
can present planned, ongoing, and recently finished theses in order
to receive feedback. We also accept presentations of papers that
have already been published elsewhere.
There is no filtering of contributions. However, there is a voluntary
submission process with peer review. Submissions should have a length
of up to eight pages and be formatted using one of the common paper
templates (e.g., llncs.cls). You can also attend the convention
without giving a talk at all.
TOPICS OF INTEREST
* abuse detection and protection
* anonymous routing
* application layer privacy
* big data and data protection
* economics of PETs
* end-user education and training
* HCI issues and usability
* intrusion detection while respecting privacy
* location privacy
* metrics for quality of protection
* mobile networks and smartphone applications
* performance optimization and measurement
* privacy in ubiquitous computing environments
* related legal issues (data protection)
PROGRAM
The program starts after lunch at 1.00 pm of the first day and
consists of short talks (15 min.), followed by discussions and
breaks. We will have dinner in the evening to foster the exchange of
new ideas. On the second day we continue with talks in the morning
before we close the workshop at lunchtime.
REGISTRATION AND SUBMISSION
If you would like to attend PET-CON, please send an e-mail to
registration(a)pet-con.de with the following information
* your name and affiliation
* whether you want to give a talk or not
* (optional) the title of your talk and a short abstract
* (optional) a PDF file to submit to the peer review process
* (optional) if you are willing to help in the review process and
how many papers you'd review at most (1-5)
* whether you want to have lunch on day 1
* whether you want to have dinner on day 1
* whether you want to have lunch on day 2
There will be no participation fee, however you have to pay for travel
and accommodation costs for yourself (or ask your professor/university
for a refund). We are currently looking for sponsors who can cover
(part of) the costs for lunch and/or dinner.
We plan to publish a collection of the submitted papers in electronic
form on a publication server of one of the participating universities.
Authors may opt-out on this.
IMPORTANT DATES (extended submission deadline)
* (Optional) Paper submission for peer review: 22 Aug 2017
* Feedback from peer review: 4 Sep 2017
* Registration
if you submit a paper for peer review: 22 Aug 2017
for all other participants: 4 Sep 2017
* Workshop: 11-12 Sep 2017
* Final version for electronic proceedings: 25 Sep 2017
ORGANIZATION
The event is organized by
* Dominik Herrmann (University of Hamburg)
* Sebastian Pape (Goethe University Frankfurt)
You can reach the organizers via e-mail at sebastian.pape(a)m-chair.de
and herrmann(a)informatik.uni-hamburg.de.
--
Dominik Herrmann (Postdoctoral Researcher)
Tel: +49-40-42883-2092 - https://herdom.net/
University of Hamburg - Department of Computer Science
Security in Distributed Systems Group
**********************************************************************
CALL FOR PARTICIPATION
*********************************************************************
7th Privacy Enhancing Techniques Convention: PET-CON 2017.2
11–12 September 2017
University of Hamburg (Hamburg, Germany)
http://pet-con.de/
**********************************************************************
We invite you to attend PET-CON 2017.2 -- the seventh convention in
Germany in the area of Privacy Enhancing Techniques. PET-CON brings
together students (B.Sc., M.Sc., PhD), junior researchers, privacy
activists and other interested people to discuss work in progress.
PET-CON is organized by the PET interest group of the German Computer
Science Society (GI). Previous PET-CONs took place at University of
Regensburg, TU Dresden, TU Darmstadt, RWTH Aachen, and Goethe
University Frankfurt.
PET-CON is a very informal gathering. The workshop consists of
short contributed talks (10-15 minutes) followed by extensive
feedback and discussions (up to 45 minutes). For instance, students
can present planned, ongoing, and recently finished theses in order
to receive feedback. We also accept presentations of papers that
have already been published elsewhere.
There is no filtering of contributions. However, there is a voluntary
submission process with peer review. Submissions should have a length
of up to eight pages and be formatted using one of the common paper
templates (e.g., llncs.cls). You can also attend the convention
without giving a talk at all.
TOPICS OF INTEREST
* abuse detection and protection
* anonymous routing
* application layer privacy
* big data and data protection
* economics of PETs
* end-user education and training
* HCI issues and usability
* intrusion detection while respecting privacy
* location privacy
* metrics for quality of protection
* mobile networks and smartphone applications
* performance optimization and measurement
* privacy in ubiquitous computing environments
* related legal issues (data protection)
PROGRAM
The program starts after lunch at 1.00 pm of the first day and
consists of short talks (15 min.), followed by discussions and
breaks. We will have dinner in the evening to foster the exchange of
new ideas. On the second day we continue with talks in the morning
before we close the workshop at lunchtime.
REGISTRATION AND SUBMISSION
If you would like to attend PET-CON, please send an e-mail to
registration(a)pet-con.de with the following information
* your name and affiliation
* whether you want to give a talk or not
* (optional) the title of your talk and a short abstract
* (optional) a PDF file to submit to the peer review process
* (optional) if you are willing to help in the review process and
how many papers you'd review at most (1-5)
* whether you want to have lunch on day 1
* whether you want to have dinner on day 1
* whether you want to have lunch on day 2
There will be no participation fee, however you have to pay for travel
and accommodation costs for yourself (or ask your professor/university
for a refund). We are currently looking for sponsors who can cover
(part of) the costs for lunch and/or dinner.
We plan to publish a collection of the submitted papers in electronic
form on a publication server of one of the participating universities.
Authors may opt-out on this.
IMPORTANT DATES
* (Optional) Paper submission for peer review: 14 Aug 2017
* Feedback from peer review: 28 Aug 2017
* Registration
if you submit a paper for peer review: 14 Aug 2017
for all other participants: 4 Sep 2017
* Workshop: 11-12 Sep 2017
* Final version for electronic proceedings: 25 Sep 2017
ORGANIZATION
The event is organized by
* Dominik Herrmann (University of Hamburg)
* Sebastian Pape (Goethe University Frankfurt)
You can reach the organizers via e-mail at sebastian.pape(a)m-chair.de
and herrmann(a)informatik.uni-hamburg.de.
--
Dominik Herrmann (Postdoctoral Researcher)
Tel: +49-40-42883-2092 - https://herdom.net/
University of Hamburg - Department of Computer Science
Security in Distributed Systems Group