Scope

Protecting the communication and data infrastructure of an increasingly inter-connected world has become vital to the normal functioning of all aspects of our world. Security has emerged as an important scientific discipline whose many multifaceted complexities deserve the attention and synergy of the mathematical, computer science and engineering communities.
After the previous meetings held in la Rochelle, Montreal, Grenoble, Toronto, pairs, Clermont-ferrand, Quebec city, and Nancy, this 11th edition of the FPS symposium will be held in Montreal, Canada.
 
The aim of FPS is to discuss and exchange theoretical and practical ideas that address security issues in inter-connected systems. It aims to provide scientific presentations as well as to establish links, promote scientific collaboration, joint research programs, and student exchanges between institutions involved in this important and fast moving research field.
 
We also invite papers from researchers and practitioners working in security, privacy, trustworthy data systems and related areas to submit their original papers. The main topics, but not limited to, include:
  • Access Control Languages
  • Code Reverse Engineering and Vulnerability Exploitation
  • Computer and Network Security
  • Cryptography & Cryptanalysis
  • Data Mining & Watermarking
  • Distributed Security Protocols & Policies
  • Formal foundations in Information or Operational Security
  • Information Theoretic Security
  • Malware, Botnet and Advanced Persistent Threats
  • Privacy & Sensitive Data Management
  • Policy-based Distributed Information Systems
  • Policy-based Security Architectures
  • Security & Privacy in Digital Currencies
  • Security & Privacy in Social Networks
  • Security in Sensor Networks and RFIDs
  • Security of Big-Data
  • Security of Cloud Computing, Grid Computing
  • Security of Distributed Embedded Middleware
  • Security of P2P systems
  • Security of Service Oriented Architectures
  • Security Management and Security Policies
  • Side Channel & Physical Attacks
  • Social Engineering
  • Threat Analysis and Trust Management

Close Menu