[prev in list] [next in list] [prev in thread] [next in thread] 

List:       cryptography
Subject:    [Cryptography] CFP: Seventh International Workshop on Privacy Engineering (IWPE'21)
From:       Blagovesta Kostova via cryptography <cryptography () metzdowd ! com>
Date:       2021-05-03 16:04:44
Message-ID: E7F6FBB7-71B9-4858-A8AE-7F2F4BC67095 () epfl ! ch
[Download RAW message or body]

[Attachment #2 (text/plain)]

CFP: Seventh International Workshop on Privacy Engineering (IWPE'21)
http://iwpe.info/

co-located with the IEEE European Symposium on Security and \
Privacy<https://www.ieee-security.org/TC/EuroSP2021/index.html>

September 7th, 2021 - online


************************************************************

IMPORTANT DATES

Deadline of paper submission:      May 15, 2021 (extended)

Notification of acceptance:        June 8, 2021

Accepted Paper camera ready:       June 22, 2021  (non-archival option available)

************************************************************

We are pleased to invite you to participate in the 7th International Workshop on \
Privacy Engineering (IWPE'21).


Ongoing news reports regarding global surveillance programs, massive personal data \
breaches in corporate databases, and notorious examples of personal tragedies due to \
privacy violations have intensified societal demands for privacy-friendly systems. In \
response, current legislative and standardization processes worldwide aim to \
strengthen individual's privacy by introducing legal, organizational and technical \
frameworks that personal data collectors and processors must follow.


However, in practice, these initiatives alone are not enough to guarantee that \
organizations and software developers will be able to identify and adopt appropriate \
privacy engineering techniques in their daily practices. It is also difficult to \
systematically evaluate whether the systems developed comply with legal frameworks, \
provide necessary technical assurances, and fulfill users' privacy requirements. It \
is evident that research is needed in developing techniques and tools that can aid \
the translation of legal and normative concepts, as well as user expectations into \
systems requirements. Furthermore, methods that can support organizations and \
engineers in developing systems that address these requirements are of increasing \
value.


In this context, privacy engineering research is emerging as an important topic. \
Engineers are increasingly expected to build and maintain privacy-preserving and \
data-protection compliant systems in domains such as health, energy, transportation, \
social computing, law enforcement, public services; based on different \
infrastructures such as cloud, grid, or mobile. While there is a consensus on the \
benefits of an engineering approach to privacy, concrete proposals for models, \
methods, techniques and tools that support engineers and organizations in this \
endeavor are few and in need of immediate attention.


To cover this gap, the topics of the International Workshop on Privacy Engineering \
(IWPE'21) focus on all the aspects of privacy engineering, ranging from its \
theoretical foundations, engineering approaches, and support infrastructures, to its \
practical application in projects of different scale. Specifically, we are seeking \
the following kinds of papers:

(1) technical papers that illustrate the engineering or application of a novel \
formalism, method or other research finding (e.g., a privacy enhancing protocol) with \
preliminary evaluation;

(2) experience and practice papers that describe a case study, challenge or lessons \
learned from in a specific domain;

(3) early evaluations of methods, tools and other infrastructure that support \
privacy-related tasks;

(4) interdisciplinary studies or critical reviews of existing privacy engineering \
concepts, methods, tools and frameworks;

(5) vision papers that take a clear position informed by evidence based on a thorough \
literature review.


IWPE'21 welcomes papers that focus on novel solutions on the recent developments in \
the general area of privacy engineering. Topics of interest include, but are not \
limited to:

-Integrating law and policy compliance into the development process

-Privacy impact assessment during software development

-Privacy risk management models

-Privacy breach recovery Methods

-Technical standards, heuristics and best practices for privacy engineering

-Privacy engineering in technical standards

-Privacy requirements elicitation and analysis methods

-User privacy and data protection requirements

-Management of privacy requirements with other system requirements

-Privacy engineering strategies and design patterns

-Privacy-preserving architectures

-Privacy engineering and databases, services, and the cloud

-Privacy engineering in networks

-Engineering techniques for fairness, transparency, and privacy

-Engineering privacy in AI and ML

-Privacy engineering in the context of interaction design and usability

-Privacy testing and evaluation methods

-Validation and verification of privacy requirements

-Privacy Engineering and design

-Engineering Privacy Enhancing Technologies (PETs)

-Integration of PETs into systems

-Models and approaches for the verification of privacy properties

-Tools and formal languages supporting privacy engineering

-Teaching and training privacy engineering

-Adaptations of privacy engineering into specific software development processes

-Pilots and real-world applications

-Evaluation of privacy engineering methods, technologies and tools

-Privacy engineering and accountability

-Privacy engineering and business processes

-Privacy engineering and manageability of data in (large) enterprises

-Organizational, legal, political and economic aspects of privacy engineering

This topic list is not meant to be exhaustive; since IWPE'21 is interested in all \
aspects of privacy engineering.


************************************************************

PAPER FORMAT & SUBMISSION

We solicit unpublished short position papers (up to 4 pages) and long papers \
reporting technical, research or industry experience (up to 8 pages) on all \
dimensions of the privacy engineering domain. Each paper, written in English, must \
follow IEEE Proceedings format.

Submission of a paper should be regarded as an undertaking that, should the paper be \
accepted, at least one of the authors will attend the workshop to present the paper. \
All papers must be submitted via EasyChair at \
https://www.easychair.org/conferences/?conf=iwpe21

IWPE offers the choice of archival and non-archival paper submissions. The \
non-archival option is offered to avoid precluding future submissions to \
area-specific venues. Accepted archival submissions will be published in IEEE \
eXplore, which is indexed by EI Engineering Index, ISI Conference Proceedings \
Citation Index (CPCI-S), Scopus, etc.


************************************************************

If you have any questions regarding IWPE'21, please contact \
iwpe21@easychair.org<mailto:iwpe21@easychair.org>


IWPE'21 Organizing Committee

  Jose M. del Alamo

  Isabel Wagner

  Kim Wuyts

  Isabel Barberá

  Blagovesta Kostova


[Attachment #3 (text/html)]

<html xmlns:o="urn:schemas-microsoft-com:office:office" \
xmlns:w="urn:schemas-microsoft-com:office:word" \
xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" \
xmlns="http://www.w3.org/TR/REC-html40"> <head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p align="center" style="mso-margin-top-alt:24.0pt;margin-right:0cm;margin-bottom:0cm;margin-left:0cm;margin-bottom:.0001pt;text-align:center">
 <b><span style="font-size:18.0pt;color:black">CFP: Seventh International Workshop on \
Privacy Engineering (IWPE'21) </span></b><b><span \
style="font-size:36.0pt;color:black"><br> </span></b><a \
href="http://iwpe.info/"><b><span \
style="font-size:12.0pt">http://iwpe.info/</span></b></a><b><span \
style="font-size:12.0pt;color:black">&nbsp;</span></b><o:p></o:p></p> <p \
align="center" style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:8.0pt;font-family:&quot;Courier New&quot;;color:black">co-located \
with the </span><a href="https://www.ieee-security.org/TC/EuroSP2021/index.html"><span \
style="font-size:8.0pt;font-family:&quot;Courier New&quot;;color:#1155CC">IEEE \
European Symposium on Security and Privacy</span></a><span \
style="font-size:8.0pt;font-family:&quot;Courier \
New&quot;;color:black">&nbsp;</span><o:p></o:p></p> <p align="center" \
style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:8.0pt;font-family:&quot;Courier New&quot;;color:black">September \
7th, 2021 - online&nbsp;</span><o:p></o:p></p> <p class="MsoNormal"><span \
lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p align="center" \
style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">************************************************************</span><o:p></o:p></p>
 <p align="center" style="margin:0cm;margin-bottom:.0001pt;text-align:center"><b><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">IMPORTANT DATES</span></b><o:p></o:p></p> <p \
align="center" style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">Deadline of paper submission:&nbsp; &nbsp; &nbsp; May \
15, 2021 (extended)</span><o:p></o:p></p> <p align="center" \
style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">Notification of acceptance:&nbsp; &nbsp; &nbsp; &nbsp; \
June 8, 2021&nbsp;</span><o:p></o:p></p> <p align="center" \
style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">Accepted Paper camera ready: &nbsp; &nbsp; &nbsp; June \
22, 2021&nbsp; (non-archival option available)</span><o:p></o:p></p> <p \
align="center" style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">************************************************************</span><o:p></o:p></p>
 <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New Roman&quot;,serif;color:black">We \
are pleased to invite you to participate in the 7th International Workshop on Privacy \
Engineering (IWPE'21).&nbsp;</span><o:p></o:p></p> <p class="MsoNormal"><span \
lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">Ongoing news reports regarding global surveillance \
programs, massive personal data breaches in corporate databases, and notorious \
examples  of personal tragedies due to privacy violations have intensified societal \
demands for privacy-friendly systems. In response, current legislative and \
standardization processes worldwide aim to strengthen individual's privacy by \
introducing legal, organizational  and technical frameworks that personal data \
collectors and processors must follow.</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">However, in practice, these initiatives alone are not \
enough to guarantee that organizations and software developers will be able to \
identify  and adopt appropriate privacy engineering techniques in their daily \
practices. It is also difficult to systematically evaluate whether the systems \
developed comply with legal frameworks, provide necessary technical assurances, and \
fulfill users' privacy requirements.  It is evident that research is needed in \
developing techniques and tools that can aid the translation of legal and normative \
concepts, as well as user expectations into systems requirements. Furthermore, \
methods that can support organizations and engineers  in developing systems that \
address these requirements are of increasing value.</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New Roman&quot;,serif;color:black">In \
this context, privacy engineering research is emerging as an important topic. \
Engineers are increasingly expected to build and maintain  privacy-preserving and \
data-protection compliant systems in domains such as health, energy, transportation, \
social computing, law enforcement, public services; based on different \
infrastructures such as cloud, grid, or mobile. While there is a consensus on  the \
benefits of an engineering approach to privacy, concrete proposals for models, \
methods, techniques and tools that support engineers and organizations in this \
endeavor are few and in need of immediate attention.</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New Roman&quot;,serif;color:black">To \
cover this gap, the topics of the International Workshop on Privacy Engineering \
(IWPE'21) focus on all the aspects of privacy engineering,  ranging from its \
theoretical foundations, engineering approaches, and support infrastructures, to its \
practical application in projects of different scale. Specifically, we are seeking \
the following kinds of papers:&nbsp;</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">(1) technical papers that illustrate the engineering \
or application of a novel formalism, method or other research finding (e.g., a \
privacy  enhancing protocol) with preliminary evaluation;&nbsp;</span><o:p></o:p></p>
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">(2) experience and practice papers that describe a \
case study, challenge or lessons learned from in a specific \
domain;&nbsp;</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">(3) early evaluations of methods, tools and other \
infrastructure that support privacy-related tasks;&nbsp;</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">(4) interdisciplinary studies or critical reviews of \
existing privacy engineering concepts, methods, tools and \
frameworks;&nbsp;</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">(5) vision papers that take a clear position informed \
by evidence based on a thorough literature review.</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">IWPE'21 welcomes papers that focus on novel solutions \
on the recent developments in the general area of privacy engineering. Topics of  \
interest include, but are not limited to:</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Integrating law and policy compliance into the \
development process</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy impact assessment during software \
development</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy risk management models</span><o:p></o:p></p> \
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy breach recovery Methods</span><o:p></o:p></p> \
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Technical standards, heuristics and best practices \
for privacy engineering</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy engineering in technical \
standards</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy requirements elicitation and analysis \
methods</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-User privacy and data protection \
requirements</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Management of privacy requirements with other system \
requirements</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy engineering strategies and design \
patterns</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy-preserving \
architectures</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy engineering and databases, services, and the \
cloud</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy engineering in networks</span><o:p></o:p></p> \
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Engineering techniques for fairness, transparency, \
and privacy&nbsp;</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Engineering privacy in AI and \
ML</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy engineering in the context of interaction \
design and usability</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy testing and evaluation \
methods</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Validation and verification of privacy \
requirements</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy Engineering and design</span><o:p></o:p></p> \
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Engineering Privacy Enhancing Technologies \
(PETs)</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Integration of PETs into \
systems</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Models and approaches for the verification of privacy \
properties</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Tools and formal languages supporting privacy \
engineering</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Teaching and training privacy \
engineering</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Adaptations of privacy engineering into specific \
software development processes</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Pilots and real-world \
applications</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Evaluation of privacy engineering methods, \
technologies and tools</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy engineering and \
accountability</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy engineering and business \
processes</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Privacy engineering and manageability of data in \
(large) enterprises</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">-Organizational, legal, political and economic aspects \
of privacy engineering</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">This topic list is not meant to be exhaustive; since \
IWPE'21 is interested in all aspects of privacy \
engineering.&nbsp;</span><o:p></o:p></p> <p class="MsoNormal"><span \
lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">************************************************************</span><o:p></o:p></p>
 <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">PAPER FORMAT &amp; SUBMISSION</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New Roman&quot;,serif;color:black">We \
solicit unpublished short position papers (up to 4 pages) and long papers reporting \
technical, research or industry experience (up  to 8 pages) on all dimensions of the \
privacy engineering domain. Each paper, written in English, must follow IEEE \
Proceedings format.&nbsp;</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">Submission of a paper should be regarded as an \
undertaking that, should the paper be accepted, at least one of the authors will \
attend  the workshop to present the paper. All papers must be submitted via EasyChair \
at </span><a href="https://www.easychair.org/conferences/?conf=iwpe21"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:#1155CC">https://www.easychair.org/conferences/?conf=iwpe21</span></a><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">&nbsp;</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">IWPE offers the choice of archival and non-archival \
paper submissions. The non-archival option is offered to avoid precluding future \
submissions  to area-specific venues. Accepted archival submissions will be published \
in IEEE eXplore, which is indexed by EI Engineering Index, ISI Conference Proceedings \
Citation Index (CPCI-S), Scopus, etc.&nbsp;</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">************************************************************</span><o:p></o:p></p>
 <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New Roman&quot;,serif;color:black">If \
you have any questions regarding IWPE'21, please contact </span><a \
href="mailto:iwpe21@easychair.org"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:#1155CC">iwpe21@easychair.org</span></a><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">&nbsp;</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">IWPE'21 Organizing Committee</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">&nbsp;&nbsp;Jose M. del Alamo</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">&nbsp;&nbsp;Isabel Wagner</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">&nbsp;&nbsp;Kim Wuyts</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">&nbsp;&nbsp;Isabel Barberá</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:&quot;Times New \
Roman&quot;,serif;color:black">&nbsp;&nbsp;Blagovesta Kostova</span><o:p></o:p></p> \
<p class="MsoNormal"><span lang="EN-GB"><o:p>&nbsp;</o:p></span></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p>&nbsp;</o:p></span></p> </div>
</body>
</html>



_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
https://www.metzdowd.com/mailman/listinfo/cryptography

--===============2312451883981647558==--

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic