3rd Security and Privacy Symposium
February 13 - February 14, 2015
IIIT - Delhi

CFP in Text

Call for Posters:

We encourage students, faculty, researchers and security practitioners to submit their innovative ideas and on-going project work in the area of Security and Privacy, to seek feedback from the domain experts and prosper further collaborations.

Each submission must explicitly explain motivation, methodology, results, and implications of the results. A submission is limited to two-page double-column ACM format. Please note that you may also submit your previously published / submitted work as well (published after Jan 2014), with a mention about it in submission / publication.

Posters will be reviewed by the committee on the basis of novelty, clarity and impact. Authors of accepted papers will be asked to create a poster to demonstrate their work in the Symposium.

Posters are invited on all areas in Security and Privacy (but not limited to):

  • Cloud Computing
  • Communication Systems
  • Embedded Systems and Mobile Computing
  • Online Social Networks
  • Software, Hardware, Network and Web
  • Security and Privacy Policies
  • Usable Security
  • Formal Methods in Security
  • Applied Cryptography
  • Digital Forensics
  • Privacy Preserving Systems

Submissions can be made at https://easychair.org/conferences/?conf=spsymp15 before 22 Jan, 2015, 23:59hrs IST.

We will be awarding Top 3 Best Student Poster Awards. We are also planning for other awards. Authors of accepted posters must register for the symposium.

Call for Accepted Papers:

All accepted papers at reputed security and privacy conferences (suggestive, but not complete - WWW, CCS, AsiaCCS, IndoCrypt etc.) published in the period Jan 2014 - Feb 2015 are invited for submission. Authors of accepted papers at the symposium will get 15 minutes to present the paper. Motivation for this is to provide authors a national level forum to showcase their work.

Accepted papers are invited on all areas in Security and Privacy (but not limited to):

  • Cloud Computing
  • Communication Systems
  • Embedded Systems and Mobile Computing
  • Online Social Networks
  • Software, Hardware, Network and Web
  • Security and Privacy Policies
  • Usable Security
  • Formal Methods in Security
  • Applied Cryptography
  • Digital Forensics
  • Privacy Preserving Systems
Submissions can be done here before 22 Jan, 2015, 23:59hrs IST. There will be awards for Best papers and presentations. Authors of accepted papers must register for the symposium.

Capture the Flag:

Who: UG and PG students of any college/university in India

What: Challenges for reverse engineering a malware, ethical hacking into a server, penetration testing.
You would be challenged on your network security skills

When: 13 Feb, 2015, 1500 - 2000 hours

Where: B.Tech labs, 2nd floor, library building, IIIT - Delhi

Personal laptops will not be allowed to be used. Internet will not be allowed during the event. To participate, students must
register here by 3 Feb, 2015, 23:59hrs IST. The team size can be upto 4 members.