[prev in list] [next in list] [prev in thread] [next in thread]
List: cryptography
Subject: [Cryptography] CFP: Seventh International Workshop on Privacy Engineering (IWPE'21)
From: Blagovesta Kostova via cryptography <cryptography () metzdowd ! com>
Date: 2021-05-03 16:04:44
Message-ID: E7F6FBB7-71B9-4858-A8AE-7F2F4BC67095 () epfl ! ch
[Download RAW message or body]
[Attachment #2 (text/plain)]
CFP: Seventh International Workshop on Privacy Engineering (IWPE'21)
http://iwpe.info/
co-located with the IEEE European Symposium on Security and \
Privacy<https://www.ieee-security.org/TC/EuroSP2021/index.html>
September 7th, 2021 - online
************************************************************
IMPORTANT DATES
Deadline of paper submission: May 15, 2021 (extended)
Notification of acceptance: June 8, 2021
Accepted Paper camera ready: June 22, 2021 (non-archival option available)
************************************************************
We are pleased to invite you to participate in the 7th International Workshop on \
Privacy Engineering (IWPE'21).
Ongoing news reports regarding global surveillance programs, massive personal data \
breaches in corporate databases, and notorious examples of personal tragedies due to \
privacy violations have intensified societal demands for privacy-friendly systems. In \
response, current legislative and standardization processes worldwide aim to \
strengthen individual's privacy by introducing legal, organizational and technical \
frameworks that personal data collectors and processors must follow.
However, in practice, these initiatives alone are not enough to guarantee that \
organizations and software developers will be able to identify and adopt appropriate \
privacy engineering techniques in their daily practices. It is also difficult to \
systematically evaluate whether the systems developed comply with legal frameworks, \
provide necessary technical assurances, and fulfill users' privacy requirements. It \
is evident that research is needed in developing techniques and tools that can aid \
the translation of legal and normative concepts, as well as user expectations into \
systems requirements. Furthermore, methods that can support organizations and \
engineers in developing systems that address these requirements are of increasing \
value.
In this context, privacy engineering research is emerging as an important topic. \
Engineers are increasingly expected to build and maintain privacy-preserving and \
data-protection compliant systems in domains such as health, energy, transportation, \
social computing, law enforcement, public services; based on different \
infrastructures such as cloud, grid, or mobile. While there is a consensus on the \
benefits of an engineering approach to privacy, concrete proposals for models, \
methods, techniques and tools that support engineers and organizations in this \
endeavor are few and in need of immediate attention.
To cover this gap, the topics of the International Workshop on Privacy Engineering \
(IWPE'21) focus on all the aspects of privacy engineering, ranging from its \
theoretical foundations, engineering approaches, and support infrastructures, to its \
practical application in projects of different scale. Specifically, we are seeking \
the following kinds of papers:
(1) technical papers that illustrate the engineering or application of a novel \
formalism, method or other research finding (e.g., a privacy enhancing protocol) with \
preliminary evaluation;
(2) experience and practice papers that describe a case study, challenge or lessons \
learned from in a specific domain;
(3) early evaluations of methods, tools and other infrastructure that support \
privacy-related tasks;
(4) interdisciplinary studies or critical reviews of existing privacy engineering \
concepts, methods, tools and frameworks;
(5) vision papers that take a clear position informed by evidence based on a thorough \
literature review.
IWPE'21 welcomes papers that focus on novel solutions on the recent developments in \
the general area of privacy engineering. Topics of interest include, but are not \
limited to:
-Integrating law and policy compliance into the development process
-Privacy impact assessment during software development
-Privacy risk management models
-Privacy breach recovery Methods
-Technical standards, heuristics and best practices for privacy engineering
-Privacy engineering in technical standards
-Privacy requirements elicitation and analysis methods
-User privacy and data protection requirements
-Management of privacy requirements with other system requirements
-Privacy engineering strategies and design patterns
-Privacy-preserving architectures
-Privacy engineering and databases, services, and the cloud
-Privacy engineering in networks
-Engineering techniques for fairness, transparency, and privacy
-Engineering privacy in AI and ML
-Privacy engineering in the context of interaction design and usability
-Privacy testing and evaluation methods
-Validation and verification of privacy requirements
-Privacy Engineering and design
-Engineering Privacy Enhancing Technologies (PETs)
-Integration of PETs into systems
-Models and approaches for the verification of privacy properties
-Tools and formal languages supporting privacy engineering
-Teaching and training privacy engineering
-Adaptations of privacy engineering into specific software development processes
-Pilots and real-world applications
-Evaluation of privacy engineering methods, technologies and tools
-Privacy engineering and accountability
-Privacy engineering and business processes
-Privacy engineering and manageability of data in (large) enterprises
-Organizational, legal, political and economic aspects of privacy engineering
This topic list is not meant to be exhaustive; since IWPE'21 is interested in all \
aspects of privacy engineering.
************************************************************
PAPER FORMAT & SUBMISSION
We solicit unpublished short position papers (up to 4 pages) and long papers \
reporting technical, research or industry experience (up to 8 pages) on all \
dimensions of the privacy engineering domain. Each paper, written in English, must \
follow IEEE Proceedings format.
Submission of a paper should be regarded as an undertaking that, should the paper be \
accepted, at least one of the authors will attend the workshop to present the paper. \
All papers must be submitted via EasyChair at \
https://www.easychair.org/conferences/?conf=iwpe21
IWPE offers the choice of archival and non-archival paper submissions. The \
non-archival option is offered to avoid precluding future submissions to \
area-specific venues. Accepted archival submissions will be published in IEEE \
eXplore, which is indexed by EI Engineering Index, ISI Conference Proceedings \
Citation Index (CPCI-S), Scopus, etc.
************************************************************
If you have any questions regarding IWPE'21, please contact \
iwpe21@easychair.org<mailto:iwpe21@easychair.org>
IWPE'21 Organizing Committee
Jose M. del Alamo
Isabel Wagner
Kim Wuyts
Isabel Barberá
Blagovesta Kostova
[Attachment #3 (text/html)]
<html xmlns:o="urn:schemas-microsoft-com:office:office" \
xmlns:w="urn:schemas-microsoft-com:office:word" \
xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" \
xmlns="http://www.w3.org/TR/REC-html40"> <head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
--></style>
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p align="center" style="mso-margin-top-alt:24.0pt;margin-right:0cm;margin-bottom:0cm;margin-left:0cm;margin-bottom:.0001pt;text-align:center">
<b><span style="font-size:18.0pt;color:black">CFP: Seventh International Workshop on \
Privacy Engineering (IWPE'21) </span></b><b><span \
style="font-size:36.0pt;color:black"><br> </span></b><a \
href="http://iwpe.info/"><b><span \
style="font-size:12.0pt">http://iwpe.info/</span></b></a><b><span \
style="font-size:12.0pt;color:black"> </span></b><o:p></o:p></p> <p \
align="center" style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:8.0pt;font-family:"Courier New";color:black">co-located \
with the </span><a href="https://www.ieee-security.org/TC/EuroSP2021/index.html"><span \
style="font-size:8.0pt;font-family:"Courier New";color:#1155CC">IEEE \
European Symposium on Security and Privacy</span></a><span \
style="font-size:8.0pt;font-family:"Courier \
New";color:black"> </span><o:p></o:p></p> <p align="center" \
style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:8.0pt;font-family:"Courier New";color:black">September \
7th, 2021 - online </span><o:p></o:p></p> <p class="MsoNormal"><span \
lang="EN-GB"><o:p> </o:p></span></p> <p align="center" \
style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">************************************************************</span><o:p></o:p></p>
<p align="center" style="margin:0cm;margin-bottom:.0001pt;text-align:center"><b><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">IMPORTANT DATES</span></b><o:p></o:p></p> <p \
align="center" style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">Deadline of paper submission: May \
15, 2021 (extended)</span><o:p></o:p></p> <p align="center" \
style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">Notification of acceptance: \
June 8, 2021 </span><o:p></o:p></p> <p align="center" \
style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">Accepted Paper camera ready: June \
22, 2021 (non-archival option available)</span><o:p></o:p></p> <p \
align="center" style="margin:0cm;margin-bottom:.0001pt;text-align:center"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">************************************************************</span><o:p></o:p></p>
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New Roman",serif;color:black">We \
are pleased to invite you to participate in the 7th International Workshop on Privacy \
Engineering (IWPE'21). </span><o:p></o:p></p> <p class="MsoNormal"><span \
lang="EN-GB"><o:p> </o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">Ongoing news reports regarding global surveillance \
programs, massive personal data breaches in corporate databases, and notorious \
examples of personal tragedies due to privacy violations have intensified societal \
demands for privacy-friendly systems. In response, current legislative and \
standardization processes worldwide aim to strengthen individual's privacy by \
introducing legal, organizational and technical frameworks that personal data \
collectors and processors must follow.</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p> </o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">However, in practice, these initiatives alone are not \
enough to guarantee that organizations and software developers will be able to \
identify and adopt appropriate privacy engineering techniques in their daily \
practices. It is also difficult to systematically evaluate whether the systems \
developed comply with legal frameworks, provide necessary technical assurances, and \
fulfill users' privacy requirements. It is evident that research is needed in \
developing techniques and tools that can aid the translation of legal and normative \
concepts, as well as user expectations into systems requirements. Furthermore, \
methods that can support organizations and engineers in developing systems that \
address these requirements are of increasing value.</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p> </o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New Roman",serif;color:black">In \
this context, privacy engineering research is emerging as an important topic. \
Engineers are increasingly expected to build and maintain privacy-preserving and \
data-protection compliant systems in domains such as health, energy, transportation, \
social computing, law enforcement, public services; based on different \
infrastructures such as cloud, grid, or mobile. While there is a consensus on the \
benefits of an engineering approach to privacy, concrete proposals for models, \
methods, techniques and tools that support engineers and organizations in this \
endeavor are few and in need of immediate attention.</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p> </o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New Roman",serif;color:black">To \
cover this gap, the topics of the International Workshop on Privacy Engineering \
(IWPE'21) focus on all the aspects of privacy engineering, ranging from its \
theoretical foundations, engineering approaches, and support infrastructures, to its \
practical application in projects of different scale. Specifically, we are seeking \
the following kinds of papers: </span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">(1) technical papers that illustrate the engineering \
or application of a novel formalism, method or other research finding (e.g., a \
privacy enhancing protocol) with preliminary evaluation; </span><o:p></o:p></p>
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">(2) experience and practice papers that describe a \
case study, challenge or lessons learned from in a specific \
domain; </span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">(3) early evaluations of methods, tools and other \
infrastructure that support privacy-related tasks; </span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">(4) interdisciplinary studies or critical reviews of \
existing privacy engineering concepts, methods, tools and \
frameworks; </span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">(5) vision papers that take a clear position informed \
by evidence based on a thorough literature review.</span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p> </o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">IWPE'21 welcomes papers that focus on novel solutions \
on the recent developments in the general area of privacy engineering. Topics of \
interest include, but are not limited to:</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Integrating law and policy compliance into the \
development process</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy impact assessment during software \
development</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy risk management models</span><o:p></o:p></p> \
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy breach recovery Methods</span><o:p></o:p></p> \
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Technical standards, heuristics and best practices \
for privacy engineering</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy engineering in technical \
standards</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy requirements elicitation and analysis \
methods</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-User privacy and data protection \
requirements</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Management of privacy requirements with other system \
requirements</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy engineering strategies and design \
patterns</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy-preserving \
architectures</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy engineering and databases, services, and the \
cloud</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy engineering in networks</span><o:p></o:p></p> \
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Engineering techniques for fairness, transparency, \
and privacy </span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Engineering privacy in AI and \
ML</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy engineering in the context of interaction \
design and usability</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy testing and evaluation \
methods</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Validation and verification of privacy \
requirements</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy Engineering and design</span><o:p></o:p></p> \
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Engineering Privacy Enhancing Technologies \
(PETs)</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Integration of PETs into \
systems</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Models and approaches for the verification of privacy \
properties</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Tools and formal languages supporting privacy \
engineering</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Teaching and training privacy \
engineering</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Adaptations of privacy engineering into specific \
software development processes</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Pilots and real-world \
applications</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Evaluation of privacy engineering methods, \
technologies and tools</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy engineering and \
accountability</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy engineering and business \
processes</span><o:p></o:p></p> <p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Privacy engineering and manageability of data in \
(large) enterprises</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">-Organizational, legal, political and economic aspects \
of privacy engineering</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">This topic list is not meant to be exhaustive; since \
IWPE'21 is interested in all aspects of privacy \
engineering. </span><o:p></o:p></p> <p class="MsoNormal"><span \
lang="EN-GB"><o:p> </o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">************************************************************</span><o:p></o:p></p>
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">PAPER FORMAT & SUBMISSION</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New Roman",serif;color:black">We \
solicit unpublished short position papers (up to 4 pages) and long papers reporting \
technical, research or industry experience (up to 8 pages) on all dimensions of the \
privacy engineering domain. Each paper, written in English, must follow IEEE \
Proceedings format. </span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">Submission of a paper should be regarded as an \
undertaking that, should the paper be accepted, at least one of the authors will \
attend the workshop to present the paper. All papers must be submitted via EasyChair \
at </span><a href="https://www.easychair.org/conferences/?conf=iwpe21"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:#1155CC">https://www.easychair.org/conferences/?conf=iwpe21</span></a><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black"> </span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">IWPE offers the choice of archival and non-archival \
paper submissions. The non-archival option is offered to avoid precluding future \
submissions to area-specific venues. Accepted archival submissions will be published \
in IEEE eXplore, which is indexed by EI Engineering Index, ISI Conference Proceedings \
Citation Index (CPCI-S), Scopus, etc. </span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p> </o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">************************************************************</span><o:p></o:p></p>
<p style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New Roman",serif;color:black">If \
you have any questions regarding IWPE'21, please contact </span><a \
href="mailto:iwpe21@easychair.org"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:#1155CC">iwpe21@easychair.org</span></a><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black"> </span><o:p></o:p></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p> </o:p></span></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black">IWPE'21 Organizing Committee</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black"> Jose M. del Alamo</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black"> Isabel Wagner</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black"> Kim Wuyts</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black"> Isabel Barberá</span><o:p></o:p></p> <p \
style="margin:0cm;margin-bottom:.0001pt"><span \
style="font-size:10.0pt;font-family:"Times New \
Roman",serif;color:black"> Blagovesta Kostova</span><o:p></o:p></p> \
<p class="MsoNormal"><span lang="EN-GB"><o:p> </o:p></span></p> <p \
class="MsoNormal"><span lang="EN-GB"><o:p> </o:p></span></p> </div>
</body>
</html>
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
https://www.metzdowd.com/mailman/listinfo/cryptography
--===============2312451883981647558==--
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic