{"id":809,"date":"2023-10-30T15:47:00","date_gmt":"2023-10-30T15:47:00","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/10\/30\/call-for-papers-real-world-security-protocols\/"},"modified":"2023-10-30T15:47:00","modified_gmt":"2023-10-30T15:47:00","slug":"call-for-papers-real-world-security-protocols","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/10\/30\/call-for-papers-real-world-security-protocols\/","title":{"rendered":"Call for Papers: Real-World Security Protocols"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<h3>Important Dates<\/h3>\n<ul>\n<li><span style=\"font-weight: 400;\">Articles due to ScholarOne: 12 April 2024\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><strong>Publication date:<\/strong> November\/December 2024<\/span><\/li>\n<\/ul>\n<hr\/>\n<p><span style=\"font-weight: 400;\">Security protocols underpin many of our digital activities, such as logging on to a Wi-Fi hotspot, accessing an HTTPS website, monitoring a home IoT network, and making electronic payments. A security protocol utilises cryptographic primitives and protocols as building blocks, but also includes users and computers connected through distributed networks where messages may be intercepted and modified.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Designing and deploying security protocols is a difficult task, with errors occurring at nearly every step of the software and hardware development lifecycle. Flaws are routinely found on well-known, peer-reviewed, and even standardized protocols. Implementations and deployments sometimes diverge from formally analyzed protocols, either through misunderstandings in the protocol itself, failures to replicate the necessary assumptions made in the analysis, or deviations made in the name of improved efficiency or performance. Usability issues sometimes block or impede the successful deployment of a protocol or yield otherwise negative effects for end users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over the past several decades, many security protocols have been proposed though not all have made it to production. What are the main considerations for a security protocol to be deployable in the real world? What are the useful lessons that we can learn from the practical deployments of those protocols? What can be done to improve the process by which security protocols are specified, analyzed, implemented, and eventually deployed?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This special issue is dedicated to <\/span><b>real-world security protocols<\/b><span style=\"font-weight: 400;\">. Topics include but are not limited to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Case studies of real-world deployments of security protocols (e.g., SSL\/TLS, SSH, Wi-Fi WPA, Bluetooth, EMV, e-voting, e-auction, privacy-enhancing technologies, and multi-party computation)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implementation challenges (e.g., side-channel attacks) and the common pitfalls<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Standardization of security protocols, the challenges and the lessons<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Human factors (e.g., usability) and their impact on the practical use of a security protocol<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security proofs, the assurance, limitations and how the security proofs (and the underlying assumptions) stand up to the test in real-world applications<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aspects of efficiency (e.g., rounds, computation, and bandwidth), their relevance to the real-world adoption of a protocol, and how over-optimization might cause failure<\/span><\/li>\n<\/ul>\n<hr\/>\n<h3>Submission Guidelines<\/h3>\n<p><span style=\"font-weight: 400;\">For author information and submission criteria for full-papers, please visit <\/span><span style=\"font-weight: 400;\">the Author Information page<\/span><span style=\"font-weight: 400;\">. As stated there, full papers should be 4900 \u2013 7200 words in length, with a maximum of 15 references. Please submit full papers through <\/span><span style=\"font-weight: 400;\">the ScholarOne system<\/span><span style=\"font-weight: 400;\">, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. <\/span><\/p>\n<p>\u00a0<\/p>\n<hr\/>\n<h3>Questions?<\/h3>\n<p><strong>Contact the guest editors at <\/strong><b>sp6-24@computer.org.<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Feng Hao, University of Warwick, UK<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Christopher Wood, Cloudflare, USA<\/span><\/li>\n<\/ul><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/digital-library\/magazines\/sp\/cfp-real-world-security-protocols\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Important Dates Articles due to ScholarOne: 12 April 2024\u00a0 Publication date: November\/December 2024 Security protocols underpin many of our&hellip;<\/p>\n","protected":false},"author":1,"featured_media":810,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[486,703,704],"tags":[],"class_list":["post-809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-call-for-papers","category-call-for-papers-filter-post","category-cfp-sp"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=809"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/809\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/810"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}