Call for Papers

Papers offering novel research contributions on any aspect of computer security are solicited for submission to the Twelfth European Symposium on Research in Computer Security (ESORICS 2007). Organized in a series of European countries, ESORICS is confirmed as the European research event in computer security. The symposium started in 1990 and has been held on alternate years in different European countries and attracts an international audience from both the academic and industrial communities. From 2002 it has been held yearly. ESORICS has established itself as one of the premiere international gatherings on information assurance.

Papers may present theory, mechanisms, applications, or practical experience on all traditional or emerging topics relevant for security in computing systems. For example, the submissions might treat any innovative aspects of one or several topics listed in the following:

  • security architecture and secure components (trusted computing modules, smartcards, personal computing devices, networks, information systems, applications, peer-to-peer connections, language-based security, ... )
  • access control (authorization, privileges, delegation, revocation, credentials, authentication, accountability, safety analysis, ... )
  • information control (data flows, information flows, inferences, covert channel analysis, ... )
  • applied cryptography (protocol design, protocol verification, authentication protocols, identity management, key distribution, ... )
  • tolerance and survivability (attack models, vulnerability analysis, intrusion detection, malware collection and analysis, ... )
  • security management (requirements engineering, policy specification, trust evaluation, policy enforcement, ... )
  • secure electronic commerce, administration, and government (digital rights management, intellectual property protection, privacy-enhancing technologies, e-voting, ... )
  • formal methods in security (security models, security verification, ... )

The primary focus is on high-quality original unpublished research, case studies and implementation experiences. We encourage submissions of papers discussing industrial research and development. Proceedings will be published by Springer in the Lecture Notes in Computer Science series.

The symposium will be accompanied by a series of workshops.

Instructions for Paper Submissions

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using 11-point font), and at most 20 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Authors are encouraged to follow the Information for LNCS Authors provided by Springer already when preparing their submission.

Authors must submit their paper using this web submission interface following the requirements stated there. In particular:

  • The submission must be uploaded as an Adobe pdf file; all other formats will be automatically rejected.
  • The uploaded pdf file must satisfy the page restrictions stated above (15 pages + bibliography and appendices; 20 pages total); otherwise the file will be automatically rejected.
  • The submission must be accompanied by an abstract of at most 300 words in ASCII format.
  • The submission must be complemented by the relevant keywords selected from the suggested list. Basically, this list is taken from the call for papers in a slightly adapted form, preserving the non-alphabetical sorting according to a possible classification of subfields of IT-security. However, authors are encouraged to deliberately select any combination of keywords, seen appropriate from their point of view.
  • The submission must be received by April 4, 2007 in order to be considered.

After a successful submission, the contact author will receive an automatically generated acknowledgement by email. A failed submission should normally result in an error message.

Authors of accepted papers must be prepared to sign a copyright statement and must guarantee that their paper will be presented at the conference. Authors of accepted papers must follow the guidelines in the Information for LNCS Authors for the preparation of the manuscript and use the templates provided there. Papers included in the conference proceedings must be typeset in LaTeX.