<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Segoe UI Light";
panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
{font-family:"Segoe UI";
panose-1:2 11 5 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p
{mso-style-priority:99;
margin:0cm;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-style-priority:99;
margin:0cm;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.EmailStyle19
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle20
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle21
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle22
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle23
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle24
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle25
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle26
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle27
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle28
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="SL" link="blue" vlink="purple">
<div class="WordSection1">
<p><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;color:black">Call for Papers (Extended submission: January 5, 2020, 23:59 CET)</span><span style="font-family:"Calibri",sans-serif;color:black"><o:p></o:p></span></p>
<div>
<div>
<div id="divtagdefaultwrapper">
<div>
<div>
<div>
<div id="divtagdefaultwrapper">
<div>
<div>
<p><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;color:black">35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference<br>
May 26 - 28, 2020<br>
Hotel City, Maribor, Slovenia<br>
<a href="https://sec2020.um.si" id="LPlnk366070">https://sec2020.um.si</a><br>
<a href="mailto:sec2020@um.si">sec2020@um.si</a><br>
<br>
The IFIP SEC conference is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information Processing Systems (TC-11,
<a href="http://www.ifiptc11.org" id="LPlnk435587">www.ifiptc11.org</a>). We seek submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy protection in ICT Systems.<br>
<br>
-----------------------------------------------<br>
<br>
TOPICS<br>
Not limited to<br>
• Access control and authentication<br>
• Applied cryptography<br>
• Audit and risk analysis<br>
• Big data security and privacy<br>
• Cloud security and privacy<br>
• Critical infrastructure protection<br>
• Cyber-physical systems security<br>
• Data and applications security<br>
• Digital forensics<br>
• Human aspects of security and privacy<br>
• Identity management<br>
• Information security education<br>
• Information security management<br>
• Information technology misuse and the law<br>
• Managing information security functions<br>
• Mobile security<br>
• Multilateral security<br>
• Network & distributed systems security<br>
• Pervasive systems security<br>
• Privacy protection and Privacy-by-design<br>
• privacy enhancing technologies<br>
• Surveillance and counter-surveillance<br>
• Trust management<br>
<br>
-----------------------------------------------<br>
<br>
SUBMISSION GUIDELINES<br>
Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration. Accepted papers will be presented at the conference and included in the conference proceedings published in the IFIP AICT series by Springer
Science and Business Media.<br>
All papers must be written in English. Submissions should be at most 14 pages long in total including references and appendices. Submissions should not be anonymised. PC members are not required to read the appendices, so the paper should be intelligible without
them.<br>
Authors must follow the Springer LNCS formatting instructions. For camera-ready papers use Latex or Word style (find here:
<a href="http://preview.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines" id="LPlnk40086">
http://preview.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines</a>).
</span><span style="color:black"><o:p></o:p></span></p>
<div style="margin-bottom:15.0pt;overflow:auto" id="LPBorder_GT_15754560857260.37124690718022424">
<table class="MsoNormalTable" border="1" cellspacing="0" cellpadding="0" width="90%" style="width:90.0%;background:white;border-top:dotted #C8C8C8 1.0pt;border-left:none;border-bottom:dotted #C8C8C8 1.0pt;border-right:none">
<tbody>
<tr>
<td width="271" valign="top" style="width:187.5pt;border:none;padding:15.0pt 15.0pt 15.0pt .75pt">
<div style="margin-top:5.0pt;margin-bottom:5.0pt;display:table" id="LPImageContainer_15754560857240.7232472490027224">
<p style="background:white"><a href="http://preview.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines" target="_blank"><span style="text-decoration:none"><img border="0" width="250" height="226" style="width:2.6041in;height:2.3541in" id="_x0000_i1025" src="https://images.springer.com/cda/content/image/cda_displayimage.jpg?SGWID=0-0-16-2208184-0"></span></a><o:p></o:p></p>
</div>
</td>
<td valign="top" style="border:none;padding:0cm 0cm 0cm 0cm;display:table-cell" id="TextCell_15754560857250.5480556663009666">
<div id="LPTitle_15754560857250.08166489957143486">
<p><span style="font-size:16.0pt;font-family:"Segoe UI Light",sans-serif;color:#0078D7"><a href="http://preview.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines" target="_blank"><span style="text-decoration:none">Conference Proceedings
guidelines | Springer</span></a></span><o:p></o:p></p>
</div>
<div style="margin-top:7.5pt;margin-bottom:12.0pt" id="LPMetadata_15754560857260.08214924579158844">
<p style="line-height:10.5pt"><span style="font-size:10.5pt;font-family:"Segoe UI",sans-serif;color:#666666">preview.springer.com</span><o:p></o:p></p>
</div>
<div id="LPDescription_15754560857260.5489460576358689">
<p style="line-height:15.0pt"><span style="font-size:10.5pt;font-family:"Segoe UI",sans-serif;color:#666666">Below you will find Springer's guidelines and technical instructions for the preparation of contributions to be published in one of the
following seri</span><o:p></o:p></p>
</div>
</td>
</tr>
</tbody>
</table>
</div>
<p><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;color:black"><br>
<br>
Each paper will receive at least three reviews. At least one author of each accepted paper must register by the early registration date indicated on the conference website and present the paper. For each accepted paper, at least one full registration is necessary.<br>
After the conference, extended versions of selected papers will be considered for publication in the journal Computers & Security. Those papers will undergo at least one other review round.<br>
The best student paper will receive the Yves Deswarte Best Student Paper Award. The paper must be original and carried out principally by the student presenting the paper, and the student must be the lead author. A student who is to be considered for the best
paper award must be a full time (as determined by the student’s institution) registered undergraduate, graduate, or doctoral student at the time of submission of the paper. Further information can be found at:
<a href="https://sec2020.um.si/yves-deswarte-best-student-paper-award/" id="LPlnk271398">
https://sec2020.um.si/yves-deswarte-best-student-paper-award/</a>.<br>
The winner of the Best Student Paper award receives a certificate, prize money of 1000 € and a free registration at IFIP SEC 2021 conference.<br>
Further information and submission: <a href="https://sec2020.um.si/" id="LPlnk408483">
https://sec2020.um.si/</a><br>
Papers have to be submitted via Easychair conference system, which can be found at
<a href="https://easychair.org/conferences/?conf=ifipsec2020" id="LPlnk718137">https://easychair.org/conferences/?conf=ifipsec2020</a><br>
<br>
-----------------------------------------------<br>
<br>
IMPORTANT DATES<br>
Submission due: January 5, 2020, 23:59 CET (EXTENDED!)<br>
Notification of acceptance: February 12, 2020<br>
Submission of the camera-ready papers: March 6, 2020 (including registration of authors and payments)<br>
Conference: May 26 - 28, 2020<br>
<br>
-----------------------------------------------<br>
<br>
COMMITTEES<br>
General Chair<br>
Tatjana Welzer, University of Maribor, Faculty of Electrical Engineering and Computer Science, Maribor, Slovenia<br>
<br>
Programme committee co-chairs<br>
Kai Rannenberg, Goethe-University, Frankfurt am Main, Germany, <a href="mailto:Kai.Rannenberg@m-chair.de">
Kai.Rannenberg@m-chair.de</a><br>
Marko Hölbl, University of Maribor, Faculty of Electrical Engineering and Computer Science, Maribor, Slovenia,
<a href="mailto:marko.holbl@um.si">marko.holbl@um.si</a><br>
<br>
Organizing chair<br>
Lili Nemec Zlatolas, University of Maribor, Faculty of Electrical Engineering and Computer Science, Maribor, Slovenia<br>
<br>
Programme Committee<br>
Rose-Mharie Åhlfeldt, University of Skövde, Sweden<br>
Raja Naeem Akram, ISG-Smart Card Centre,<br>
Royal Holloway, University of London, UK<br>
Vijay Atluri, Rutgers University, USA<br>
Man Ho Au, The Hong Kong Polytechnic University, China<br>
Gergei Bana, University of Missouri, USA<br>
Joao Paulo Barraca, University of Aveiro, Portugal<br>
Pedro Brandão, University of Porto, Portugal<br>
Dagmar Brechlerova, Euromise Prague, Czech Republic<br>
Ricardo Chaves, IST / INESC-ID, Portugal<br>
Michal Choras, ITTI Ltd., Poland<br>
K P Chow, The University of Hong Kong, China<br>
Nathan Clarke, Centre for Security, Communication & Network Research, University of Plymouth, UK<br>
Miguel Correia, Universidade de Lisboa, Portugal<br>
Nora Cuppens-Boulahia, IMT Atlantique, France<br>
Paolo D'Arco, University di Salerno, Italy<br>
Ed Dawson, QUT, Research Director, Australia<br>
Sabrina De Capitani di Vimercati, Universita'<br>
degli Studi di Milano, Italy<br>
Bart De Decker, Katholieke Universiteit Leuven, Belgium<br>
Vesna Dimitrova, FCSE, University Ss.Cyril and<br>
Methodius, Skopje, North Macedonia<br>
Nicola Dragoni, Technical University of Denmark<br>
Isao Echizen, National Institute of Informatics, Japan<br>
Simone Fischer-Hübner, Karlstad University, Sweden<br>
Sara Foresti, DI - Universita` degli Studi di Milano, Italy<br>
Steven Furnell, Plymouth University, UK<br>
Chaya Ganesh, Aarhus University, Denmark<br>
Hélder Gomes, Escola Superior de Tecnologia<br>
e Gestão de Águeda, Universidade de Aveiro, Portugal<br>
Jonas Hallberg, Swedish Defence Research Agency, Sweden<br>
Lucjan Hanzlik, Stanford University, USA<br>
Paul Haskell-Dowland, Edith Cowan University, Australia<br>
Karin Hedström, Swedish Buisiness School,<br>
Örebro university, Sweden<br>
Julio Hernandez, School of Computing, UK<br>
Dominik Herrmann, University of Bamberg, Germany<br>
Xinyi Huang, Fujian Normal University, China<br>
Dieter Hutter, DFKI GmbH, Germany<br>
Pedro Inácio, Universidade da Beira Interior, Portugal<br>
Martin Gilje Jaatun, SINTEF Digital, Norway<br>
Wojciech Jamroga, University of Luxembourg, Luxembourg<br>
Lech Janczewski, The University of Auckland, New Zealand<br>
Christian Damsgaard Jensen, Technical University of Denmark, Denmark<br>
Allen Johnston, University of Alabama, USA<br>
Audun Josang, University of Oslo, Norway<br>
Jan Jürjens, Fraunhofer Institute for Software & Systems Engineering ISST and University of Koblenz-Landau, Germany<br>
Georgios Kambourakis, University of the Aegean, Greece<br>
Fredrik Karlsson, Örebro University, Sweden<br>
Dogan Kesdogan, Universität Regensburg, Germany<br>
Kwangjo Kim, Korea Advanced Institute of Science and Technology, South Korea<br>
Dongseong Kim, The University of Queensland, Australia<br>
Kamil Kluczniak, CISPA − Helmholtz Center for Information Security, Germany<br>
Andrea Kolberger, University of Applied Sciences Upper Austria, Austria<br>
Zbigniew Kotulski, Warsaw University of Technology, Poland<br>
Lukasz Krzywiecki, Wroclaw University of Technology, Poland<br>
Miroslaw Kutylowski, Wroclaw University of Science and Technology, Poland<br>
Heejo Lee, Korea University, South Korea<br>
Yingjiu Li, Singapore Management University, Singapur<br>
Maciej Liskiewicz, Inst. f. Theoretische Informatik, University Luebeck, Germany<br>
Luigi Logrippo, Université du Québec en Outaouais, Canada<br>
Javier Lopez, University of Malaga, Spain<br>
Suryadipta Majumdar, University at Albany - SUNY, USA<br>
Marian Margraf, Hochschule Darmstadt, Germany<br>
Fabio Martinelli, IIT-CNR, Italy<br>
Vashek Matyas, Masaryk University, Czech Republic<br>
Zlatogor Minchev, Institute of ICT, Bulgarian Academy of Sciences, Bulgaria<br>
Yuko Murayama, Tsuda College, Japan<br>
Maurizio Naldi, LUMSA Università Maria SS. Assunta di Roma, Italy<br>
Lili Nemec Zlatolas, University of Maribor, Faculty of Electrical Engineering and Computer Science, Slovenia<br>
Sergio Nunes, ISEG-School of Economics and Management, Portugal<br>
Balaji Palanisamy, University of Pittsburgh, USA<br>
Brajendra Panda, University of Arkansas, USA<br>
Sebastian Pape, Goethe University Frankfurt, Germany<br>
Stefano Paraboschi, Universita di Bergamo, Italy<br>
Miguel Pardal, Universidade de Lisboa, Lizbona<br>
Gilbert Peterson, US Air Force Institute of Technology, USA<br>
Raphael C.-W. Phan, Monash University, Australia<br>
António Pinto, ESTG, P.Porto, Portugal<br>
Rami Puzis, Ben Gurion University of the Negev, Israel<br>
Arun Raghuramu, Forescout Technologies Inc., USA<br>
Carlos Rieder, Isec ag, Czech Republic<br>
Juha Röning, University of Oulu, Finland<br>
Elham Rostami, Örebro University, Sweden<br>
Reyhaneh Safavi-Naini, University of Calgary, Canada<br>
Pierangela Samarati, Universita' degli Studi di Milano, Italy<br>
Damien Sauveron, XLIM (UMR University of Limoges/CNRS 7252), France<br>
Ingrid Schaumüller-Bichl, Upper Austrian University of Applied Sciences Campus Hagenberg, Austria<br>
Jetzabel Maritza Serna Olvera, Universitat Politècnica de Catalunya, Spain<br>
Paria Shirani, Concordia University, Canada<br>
Nicolas Sklavos, University of Patras, Greece<br>
Daniel Slamanig, AIT Austrian Institute of Technology, Austria<br>
Kane Smith, University of North Carolina at Greensboro, US<br>
Agusti Solanas, Smart Health Research Group | Rovira i Virgili University, Spain<br>
Teodor Sommestad, Swedish Defence Research Agency (FOI), Sweden<br>
Chunhua Su, Osaka University, Japan<br>
Shamik Sural, Indian Institute of Technology, Kharagpur, India<br>
Neeraj Suri, TU Darmstadt, Germany<br>
Kerry-Lynn Thomson, Nelson Mandela Metropolitan University, South Africa<br>
Theo Tryfonas, University of Bristol, UK<br>
Rossouw Vonsolms, Nelson Mandela Metropolitan University, South Africa<br>
Jozef Vyskoc, VaF, Finland<br>
Ding Wang, Peking University, China<br>
Lingyu Wang, Concordia University, Canada<br>
Edgar Weippl, SBA Research, Austria<br>
Tatjana Welzer, University of Maribor, Faculty of Electrical Engineering and Computer Science, Slovenia<br>
Vladimir Zadorozhny, University of Pittsburgh, USA<br>
Filip Zagorski, Wroclaw University of Technology, Poland<br>
Yuexin Zhang, Swinburne University of Technology, Australia<br>
André Zúquete, University of Aveiro, Portugal<br>
<br>
<br>
<br>
The conference is organized by the University of Maribor, Faculty of Electrical Engineering and Computer Science</span><span style="color:black"><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>