The program is available here
To register, please fill out the registration form. Registration will be accepted until May 24, 2017 and is free of charge for all participants.
The workshop is an unique occasion to listen to talks about cool and cutting-edge research results in different areas of computer security. Topics of interest include, but are not limited to:
Information security and cryptology | Communication and network security |
System security and reliability | IoT security |
Formal methods in security and reliability | Anonymity and privacy |
Access, information flow and usage controy | Security and privacy policies |
Trust models and trust managementy | Voting Systems |
Formal methods in security and reliability | Anonymity and privacy |
Distributed ledgers and blockchain applications | Fault tolerance |
Risk management and business processes | Regulatory compliance |
Security in wireless and mobile networks | Cloud computing and data outsourcing |
Socio-technical aspects of security | Data mining for security and privacy |
This year's edition will be held at the IT University of Copenhagen. Registration is required and will be accepted until May 24, 2017. Registration includes workshop attendance, lunch, and coffee breaks. Note that the workshop is free of charge for all participants.
Submission deadline | |
Notification of acceptance | |
Registration deadline | |
Workshop |
RISE SICS | |
Lund University | |
IT University of Copenhagen | |
Lund University | |
DIKU | |
DTU | |
DTU | |
DTU | |
IT University of Copenhagen | |
RISE SICS |
IT University of Copenhagen | |
IT University of Copenhagen | |
IT University of Copenhagen |
If you have any enquiries about the workshop, please contact Rosario Giustolisi or Carsten Schuermann.