[crypto] Fwd: [fc-announce] FC22 Call for Contributions
R. Hirschfeld
ray at unipay.nl
Sun Aug 22 15:04:36 CEST 2021
-------- Original Message --------
SUBJECT:
[fc-announce] FC22 Call for Contributions
DATE:
2021-08-22 13:31
FROM:
Ittay Eyal <ittay at technion.ac.il>
TO:
fc-announce at ifca.ai
CALL FOR CONTRIBUTIONS
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY 2022
Twenty-Sixth International Conference
February 14-18, 2022
Radisson Grenada Beach Resort [1]
Grenada
Financial Cryptography and Data Security 2022 is a major international
forum for research, advanced development, education, exploration, and
debate on information security with a specific focus on financial and
commercial systems. Original works on all aspects of financial security
and privacy are solicited, from fundamental theory to real-world
deployments. Submissions need not be exclusively concerned with
cryptography. Systems security, economic or behavioral perspectives, and
interdisciplinary efforts are particularly encouraged.
Since 2019, Financial Cryptography merged with the BITCOIN workshop to
incorporate both traditional financial security topics as well as
blockchains and cryptocurrencies.
Contributions are sought in the following categories:
* research papers [2],
* regular papers (15 pages + references and appendices),
* short papers (8 pages + references), and
* systematization of knowledge papers (20 pages + references and
appendices)
* workshop proposals [3] (2 pages), and
* posters [4] (1 page).
IMPORTANT DATES
Paper registration
September 2, 2021 (firm!)
Paper submission
September 9 + (0-4) days [5], 2021 (firm!)
Paper notification
November 18, 2021
Workshop proposal submission
August 20, 2021 (for full consideration;
later submissions considered on rolling basis)
Workshop proposal notification
August 27, 2021_ (on-time submissions)_
Poster submission
November 25, 2021
Poster notification
December 2, 2021
Final pre-proceedings papers
January 17, 2022
Conference
February 14-18, 2022
Submissions are accepted until 11:59pm, AoE UTC-12.
TOPICS
Topics of particular interest are listed below:
* Access Control, Authorization and Trust Management
* Anonymity and Privacy Enhancing Technologies
* Applied Cryptography
* Attacks, attack techniques, and attack case studies
* Auctions and Incentive Design
* Authentication, Identity Management and Biometrics
* Behavioral Aspects of Security and Privacy
* Blockchain Applications
* Blockchain protocols, including PoW, -stake, -burn,
permissioned/permissionless
* Censorship circumvention and resistance
* Certification and Audits
* Cloud Computing and Data Outsourcing Security
* Data Security and Privacy
* Decentralized Finance (DeFi)
* Digital Cash and Payment Systems
* Distributed Consensus Protocols
* Digital Rights Management
* Economic and Monetary Aspects of Cryptocurrencies
* Economics of Security and Privacy
* Electronic Crime and Underground Markets
* Electronic Payments and Ticketing Systems
* Empirical studies, Real-world Measurements and Metrics
* Forensics, Monitoring and Transaction Graph Analysis
* Fraud Detection and Management
* Game Theory for Security, Privacy, and Blockchain
* Language-based security and formal verification
* Legal and Regulatory Issues of Blockchains, Cryptocurrencies, and
Electronic Payments
* Machine Learning and AI Security
* Malware and Software Security
* Mobile Payments
* Network and distributed system security
* Peer-to-Peer Networks
* Phishing and Social Engineering
* Reputation Systems
* Security of Banking, Financial Services, and Electronic Commerce
* Smart Contracts and Financial Instruments
* Smartcards, Secure Tokens, and Secure Hardware
* Surveillance and Tracking
* System security
* Trusted Execution Environments (TEE) Security and Applications
* Usability and Security
* Web Security
SUBMISSION
Research paper submissions should be uploaded through the conference
submission website (see here [6]). For workshop proposals and poster
submissions, see the corresponding sections below.
SATOSHI GRACE PERIOD
Many security conferences, including this one in the past, have claimed
a firm deadline only to extend it by several days as the deadline
approached. Keeping with the tradition started in FC19, we will
implement a randomized deadline in a verifiable way.
All papers must be registered by Tue Sep 2, 2021. This means the titles,
authors, abstracts, topics, submission options, conflicts, etc.
(everything except the final PDF of the paper) must be entered into the
submission system by this date. This date is firm and will not be
extended.
On September 3, 2021, we will announce (in this space) a block height on
the Bitcoin blockchain that we expect to be found the following day.
Once the block of that height is found and confirmed, let the _last hex
digit_ of the hash of that block be _L_. Then the FC22 paper submission
deadline will be September (9 + ceil(sqrt(_L_))), 2021. In table form:
_L_
PAPER SUBMISSION DEADLINE
0
Sep 9, 2021
1
Sep 10, 2021
2, 3, 4
Sep 11, 2021
5, 6, 7, 8, 9
Sep 12, 2021
A, B, C, D, E, F
Sep 13, 2021
When the paper submission deadline has been determined in this way, this
page will be updated, and that deadline will be firm. The program
chairs' interpretation of the above algorithm is final.
If this is too complicated, you are welcome to submit a final PDF any
time by Sep 9, 2021, which is guaranteed to be before the deadline.
GENERAL INFORMATION
For each accepted paper/poster the conference requires at least one
registration at the general or academic rate, and paper authors must
sign the IFCA copyright form [7] when submitting the final version.
Alternatively, individual papers can be published as fully open
access--the publisher charges authors a fee for this.
FORMAT
Papers must be formatted in standard LNCS format (templates [8]) and
submitted as PDF files. Submissions in other formats will be rejected.
All papers must be submitted electronically according to the
instructions and forms found here and at the submission site.
ANONYMOUS SUBMISSION
Regular and short research paper submissions must be anonymized with no
author names, affiliations, acknowledgments, or obvious references.
Failure to properly anonymize submitted papers is grounds for a desk
rejection without review. It is acceptable (but by no means required)
for submitted papers to be published online in non-anonymous form (e.g.,
on authors' websites or archives like ePrint or arXiv.org). Program
committee members will be instructed not to actively seek to
de-anonymize papers.
RESUBMISSION TO AFFILIATED WORKSHOPS
Papers that are submitted but ultimately not accepted to the main
conference may be considered for acceptance at one of the associated
workshops. If you would like to take advantage of this, please indicate
this preference when submitting your paper.
EVALUATION CRITERIA
REGULAR RESEARCH PAPERS
Research papers should describe novel, previously unpublished scientific
contributions to the field, and they will be subject to rigorous peer
review. Accepted submissions will be included in the conference
proceedings to be published in the Springer-Verlag Lecture Notes in
Computer Science (LNCS) series. Submissions are limited to 15 pages in
standard LNCS format excluding references and appendices. A total page
restriction may apply for the printed proceedings version. Committee
members are not required to read the appendices, so the full papers
should be intelligible without them.
SHORT PAPERS
Short papers are also subject to peer review; however, the intention is
to encourage authors to introduce work in progress, novel applications,
and corporate/industrial experiences. Short papers will be evaluated
with a focus on novelty and potential for sparking participants'
interest and future research avenues. Short paper submissions are
limited to 8 pages in standard LNCS format in total. The paper title for
short papers must include the text "Short Paper:". Accepted submissions
will be included in the conference proceedings. The authors of some
submissions not accepted as regular research papers may be offered the
option of acceptance as a short paper.
SYSTEMATIZATION OF KNOWLEDGE PAPERS
We also solicit Systematization of Knowledge (SoK) papers. To be
suitable for publication, SoK articles must provide an added value
beyond a literature review, such as novel insights, identification of
research gaps, or challenges to commonly held assumptions. SoK paper
submissions are limited to 20 pages in standard LNCS format excluding
references and appendices. Accepted submissions will be included in the
conference proceedings. A total page restriction may apply for the
printed proceedings version. Committee members are not required to read
the appendices, so the full papers should be intelligible without them.
The paper title for systematization of knowledge papers must include the
text "SoK:".
ETHICS AND ETIQUETTE
ORIGINAL SUBMISSIONS
Authors may submit only work that does not substantially overlap with
work that is currently submitted or has been accepted for publication to
any other peer-reviewed conference/workshop with proceedings or a
journal. We consider double submission serious research fraud and will
treat it as such. Note that it is acceptable for papers to appear in
non-peer-reviewed formats (for example, as technical reports or in
online archives such as ePrint). In case of doubt contact the program
chairs for any clarifications at fc22chair at ifca.ai [9].
ETHICAL CONSIDERATIONS FOR VULNERABILITY DISCLOSURE (FROM IEEE S&P [10])
Where research identifies a vulnerability (e.g., software
vulnerabilities in a given program, design weaknesses in a hardware
system, or any other kind of vulnerability in deployed systems), we
expect that researchers act in a way that avoids gratuitous harm to
affected users and, where possible, affirmatively protects those users.
In nearly every case, disclosing the vulnerability to vendors of
affected systems, and other stakeholders, will help protect users. It is
the committee's sense that a disclosure window of 45 days [11] to 90
days [12] ahead of publication is consistent with authors' ethical
obligations.
Longer disclosure windows (which may keep vulnerabilities from the
public for extended periods of time) should only be considered in
exceptional situations, e.g., if the affected parties have provided
convincing evidence the vulnerabilities were previously unknown and the
full rollout of mitigations requires additional time. The authors are
encouraged to consult with the PC chairs in case of questions or
concerns.
The version of the paper submitted for review must discuss in detail the
steps the authors have taken or plan to take to address these
vulnerabilities; but, consistent with the timelines above, the authors
do not have to disclose vulnerabilities ahead of submission. If a paper
raises significant ethical and/or legal concerns, it might be rejected
based on these concerns. The PC chairs will be happy to consult with
authors about how this policy applies to their submissions.
It is the responsibility of all paper authors to provide clear evidence
that their work follows relevant ethical standards. If a paper raises
significant ethical and/or legal concerns, it may be rejected. The PC
chairs will consult with authors about how this policy applies to their
submissions and may request additional clarifying information about
submissions as needed.
ETHICAL CONSIDERATIONS FOR HUMAN SUBJECTS RESEARCH (FROM IEEE S&P [10])
Submissions that describe experiments on human subjects, that analyze
data derived from human subjects (even anonymized data), or that
otherwise may put humans at risk should:
* Disclose whether the research received an approval or waiver from
each of the authors' institutional ethics review boards (IRB) if
applicable.
* Discuss steps taken to ensure that participants and others who might
have been affected by an experiment were treated ethically and with
respect.
If a submission deals with any kind of personal identifiable information
(PII) or other kinds of sensitive data, the version of the paper
submitted for review must discuss in detail the steps the authors have
taken to mitigate harms to the persons identified.
CONFLICT OF INTEREST
Authors should report in the submission site any conflicts with program
committee members. A conflict exists if an author has the same
affiliation as a committee member, has ever acted as their PhD
supervisor or been supervised by them, or if they have been co-authors
on a paper within the past two years.
PROGRAM CHAIRS
Ittay Eyal
Technion
Juan Garay
Texas A&M
PROGRAM COMMITTEE
Ittai Abraham
VMware Research
Christian Badertscher
IOHK
Foteini Baldimtsi
George Mason University
Jeremiah Blocki
Purdue University
Rainer Böhme
University of Innsbruck
Joseph Bonneau
New York University
Christian Cachin
University of Bern
L Jean Camp
Indiana University
Srdjan Capkun
ETH Zurich
Hubert Chan
University of Hong Kong
Jing Chen
Stony Brook University
Michele Ciampi
The University of Edinburgh
Jeremy Clark
Concordia University
Vanesa Daza
Pompeu Fabra University
Stefan Dziembowski
University of Warsaw
Karim Eldefrawy
SRI International
Matthias Fitzi
IOHK
Chaya Ganesh
Indian Institute of Science, Bangalore
Christina Garman
Purdue University
Arthur Gervais
Imperial College London
Stephanie Hurder
Prysm Group
Ari Juels
Cornell Tech
Aniket Kate
Purdue University
Eleftherios Kokoris Kogias
IST Austria & Novi Research
Nikos Leonardos
National and Kapodistrian University of Athens
Ben Livshits
Imperial College London and Brave Software
Daniel Masny
Visa Research
Shin'ichiro Matsuo
Georgetown University / NTT Research
Patrick McCorry
Infura
Shagufta Mehnaz
Dartmouth College
Ian Miers
University of Maryland
Andrew Miller
University of Illinois at Urbana-Champaign
Tal Moran
IDC
Pedro Moreno-Sanchez
IMDEA Software Institute
Pratyay Mukherjee
Visa Research
Kartik Nayak
Duke University
Georgios Panagiotakos
IOHK
Benny Pinkas
Bar-Ilan University
Alex Psomas
Purdue University
Elizabeth Quaglia
Royal Holloway, University of London
Ling Ren
University of Illinois at Urbana-Champaign
Ori Rottenstreich
Technion
Mahmood Sharif
Tel Aviv University
abhi shelat
Northeastern University
Mark Simkin
Aarhus University
Alessandro Sorniotti
IBM Research - Zurich
Alexander Spiegelman
Novi Research
Ewa Syta
Trinity College
Qiang Tang
The University of Sydney
Vanessa Teague
Thinking Cybersecurity and the Australian National University
Daniel Tschudi
Concordium
David Tse
Stanford University
Marko Vukolic
Protocol Labs
Riad Wahby
Stanford and Algorand
Roger Wattenhofer
ETH Zurich
Edgar Weippl
University of Vienna, SBA Research
Fan Zhang
Duke University
Ren Zhang
Nervos
Yupeng Zhang
Texas A&M University
Hong-Sheng Zhou
Virginia Commonwealth University
Vassilis Zikas
Purdue University
Aviv Zohar
The Hebrew University
WORKSHOP PROPOSALS
Proposals for workshops to be held at FC22 are also solicited. A
workshop can be a full day or half day in length.
Workshop proposals should include:
* a title
* a call for papers
* a brief summary and justification, including how it would fit into
the greater FC scope
* (tentative) Program Committee and its Chair(s)
* one-paragraph biographies for key organizers, the expected (or
previous, if the workshop has been held in previous years) number of
submissions, participants and acceptance rates
Workshop proposals must not be anonymous and should be sent to
fc22workshops at ifca.ai [13]. Proposals received after the submission
deadline will be considered on a rolling basis for any remaining slots.
POSTERS
The poster session is the perfect venue to share a provocative opinion,
interesting established or preliminary work, or a cool idea that will
spark discussion. Poster presenters will benefit from a multi-hour
session to discuss their work, get exposure, and receive feedback from
attendees. Note that the poster session will only take place if there is
a physical event.
Poster submissions should be a 1-page abstract (in the same LNCS format)
describing the poster. Please keep in mind that the poster deadline is
later than the main paper notification deadline. Poster proposals must
not be anonymous and should be sent to the posters chair at
fc22posters at ifca.ai.
RUMP SESSION
FC22 will also include the popular "rump session" held on one of the
evenings in an informal, social atmosphere. The rump session is a
program of short (5 minutes), informal presentations on works in
progress, off-the-cuff ideas, and any other matters pertinent to the
conference. Any conference attendee is welcome to submit a presentation
to the Rump Session Chair (to be announced at the conference). This
submission should consist of a talk title, the name of the presenter,
and, if desired, a very brief abstract. Submissions may be sent via
e-mail or submitted in person in the morning on the day of the session.
This conference is organized annually by the International Financial
Cryptography Association [14].
_______________________________________________
fc-announce mailing list
fc-announce at ifca.ai
http://mail.ifca.ai/mailman/listinfo/fc-announce
Links:
------
[1]
https://www.radissonhotels.com/en-us/hotels/radisson-resort-grenada-beach/
[2] https://fc22.ifca.ai/cfp.html#regular
[3] https://fc22.ifca.ai/cfp.html#workshops
[4] https://fc22.ifca.ai/cfp.html#posters
[5] https://fc22.ifca.ai/cfp.html#deadline
[6] https://fc22.ifca.ai/cfp.html
[7] http://ifca.ai/documents/copyright.html
[8]
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines
[9]
https://mail.google.com/mail/?view=cm&fs=1&tf=1&to=fc22chair@ifca.ai
[10] https://www.ieee-security.org/TC/SP2021/cfpapers.html
[11]
https://vuls.cert.org/confluence/display/Wiki/Vulnerability+Disclosure+Policy
[12]
https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html
[13]
https://mail.google.com/mail/?view=cm&fs=1&tf=1&to=fc22workshops@ifca.ai
[14] https://ifca.ai/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.unipay.nl/pipermail/crypto/attachments/20210822/0e8dbd37/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: blocked.gif
Type: image/gif
Size: 118 bytes
Desc: not available
URL: <http://mail.unipay.nl/pipermail/crypto/attachments/20210822/0e8dbd37/attachment-0001.gif>
More information about the crypto
mailing list