Upcoming Events
 
SoS Logo

Upcoming Events

Mark your calendars!

This section features a wide variety of upcoming security-related conferences, workshops, symposiums, competitions, and events happening in the United States and the world. This list also includes several past events with links to proceedings or summaries of the actual activities.

Note: The events may also be found on the SoS Calendar, located by clicking the 'Calendar' tab on the left-hand navigation bar.

(ID#:15-3732)


TCC 2015 (12th Theory of Cryptography Conference), 23-25 March, Warsaw, Poland. See http://www.iacr.org/workshops/tcc2015/

PKC 2015 (IACR International Conference on Practice and Theory of Public-Key Cryptography), 30 March-1 April, Gaithersburg, MD. See http://www.iacr.org/workshops/pkc2015/

EUROCRYPT 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques), 26-30 April, Sofia, Bulgaria. See https://www.cosic.esat.kuleuven.be/eurocrypt_2015/

CSF 2015 (28th IEEE Computer Security Foundations Symposium), 13-17 July, Verona, Italy. See http://csf2015.di.univr.it/

SECRYPT 2015 (12th International Conference on Security and Cryptography), 20-22 July, Alsace, France. See http://secrypt.icete.org/

PODC 2015 (ACM Symposium on Principles of Distributed Computing), 21-23 July, San Sebastian, Portugal. See  http://www.podc.org/

CRYPTO 2015 (35th Annual Cryptology Conference), 16-20 August, Santa Barbara, CA.  See http://www.iacr.org/conferences/crypto2015/

CCS 2015 (22nd ACM Conference on Computer and Communications Security), 12-16 October, Denver, CO. See www.sigsac.org/ccs/CCS2015/

FOCS 2015 (56th Annual IEEE Symposium on Foundations of Computer Science), 18-20 October, Berkeley, CA. See http://www.cs.cmu.edu/~venkatg/FOCS-2015-cfp.html

ASIACRYPT 2015 (21st Annual International Conference on the Theory and Application of Cryptology and Information Security, 29 November-3 December, Auckland, New Zealand.  See https://www.math.auckland.ac.nz/~sgal018/AC2015/index.html


Note:



Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.