NordSec addresses a broad range of topics within IT security with the aims of bringing together computer security researchers and encouraging interaction between academia and industry. It is co-located with the Tenth International Crisis Management Workshop (CriM'16) and Oulu Winter School.
NordSec 2016 post-proceedings will be published by Springer in their LNCS. Further, Nordsec is part of the Finnish Publication forum.
NordSec 2016 Call for Papers The 21st Nordic Conference on Secure IT Systems will be held in Oulu, Finland, November 2-4, 2016. NordSec addresses a broad range of topics within IT security with the aim of bringing together computer security researchers and encouraging interaction between academia and industry. NordSec 2016 is co- located with the 10th International Crisis Management Workshop (CriM'16) and Oulu Winter School. ## Scope NordSec 2016 (http://nordsec.oulu.fi/) welcomes contributions within, but not limited to, the following areas: * Access control and security models * Applied cryptography * Cloud security * Commercial security policies and enforcement * Cyber crime, warfare, and forensics * Economic, legal, and social aspects of security * Enterprise security * Hardware and smart card security * Mobile and embedded security * Internet of Things and M2M security * Internet, communication, and network security * Intrusion detection * Language-based techniques for security * New ideas and paradigms in security * Operating system security * Privacy and anonymity * Security education and training * Security evaluation and measurement * Security management and audit * Security protocols * Security usability * Social engineering and phishing * Software security and malware * Trust and identity management * Trusted computing * Vulnerability testing ## Submitting Contributions should reflect original research, developments, studies and experience. Submitted papers should not exceed 16 pages (including references and appendices) in Springer LNCS format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submitted papers will be judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to make a good- faith effort to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Minimally, please take the following steps when preparing your submission: * Remove the names and affiliations of authors from the title page. * Remove acknowledgment of identifying names and funding sources. * Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author. * Papers must not exceed 16 pages. * Submit the paper at https://easychair.org/conferences/?conf=nordsec2016 ## Important dates * 23 June 2016: Abstract submission deadline * 01 July 2016: Paper submission deadline * 08 July 2016: Paper submission deadline (EXTENDED) * 15 August 2016: Notification * 29 August 2016: Camera-ready paper deadline * 02-04 November 2016: NordSec 2016 ## Organization * General Chair: Juha Röning, University of Oulu (Finland) * Program Chair: Billy Brumley, Tampere University of Technology (Finland) * Conference Operations: Christian Wieser, University of Oulu (Finland) Please send e-mail to nordsec2016 AT easychair DOT org if you have any questions. ### Program Committee * Magnus Almgren, Chalmers University of Technology (Sweden) * David Bernhard, University of Bristol (UK) * Karin Bernsmed, SINTEF (Norway) * Kimmo Halunen, VTT Technical Research Centre of Finland (Finland) * Catharina Candolin, Finnish Defence Forces (Finland) * Mads Dam, KTH Royal Institute of Technology (Sweden) * Nicola Dragoni, Technical University of Denmark (Denmark), Örebro University (Sweden) * Danilo Gligoroski, Norwegian University of Science and Technology (Norway) * Eric Xu Guo, Qualcomm (USA) * Xueyang Wang, Intel (USA) * Chris Hankin, Imperial College London (UK) * Rene Rydhof Hansen, Aalborg University (Denmark) * Daniel Hedin, Mälardalen University (Sweden), Chalmers University of Technology (Sweden) * Marko Helenius, Tampere University of Technology (Finland) * Kimmo Järvinen, Aalto University (Finland) * Christian Damsgaard Jensen, Technical University of Denmark (Denmark) * Frank Kargl, Ulm University (Germany) * Svein Johan Knapskog, Norwegian University of Science and Technology (Norway), Knapskog Consulting (Norway) * Ella Kolkowska, Örebro University (Sweden) * Hanno Langweg, Norwegian University of Science and Technology (Norway), HTWG Konstanz (Germany) * Peeter Laud, Cybernetica AS (Estonia) * Samuel Marchal, Aalto University (Finland) * Fabio Martinelli, IIT-CNR (Italy) * Chris Mitchell, Royal Holloway, University of London (UK) * Hanne Riis Nielson, Technical University of Denmark (Denmark) * Valtteri Niemi, University of Helsinki (Finland) * Andrew Paverd, Aalto University (Finland) * Kai Rannenberg, Goethe University Frankfurt (Germany) * Heiko Roßnagel, Fraunhofer IAO (Germany) * Ben Smeets, Lund University (Sweden) * Seppo Virtanen, University of Turku (Finland) ## Links : http://nordsec.oulu.fi/ : http://www.cse.chalmers.se/research/group/security/nordsec/contents.html : http://dblp.uni-trier.de/db/conf/nordsec/index.html : https://easychair.org/conferences/?conf=nordsec2016 : https://www.ee.oulu.fi/research/ouspg/CrIM16
|Shay Gueron / University of Haifa, Israel, and Intel Corporation (Intel Development Center, Haifa, Israel)||Intel's Software Guard Extensions technology demystified: cryptographic properties, trust assumptions, and memory encryption|
The conference will take place at the Oulu universities Ympäristötietotalo, room IT115. Signs will guide you to the conference room.
Oulu has many accomodation options, ranging from cottages to luxuary hotels.