News
STM Proceedings are online!
15 September 2020. We are pleased to announce that full papers conference proceedings are now available here.Keynote Speaker
21 July 2020. We are pleased and honored to announce that Prof. Ernesto Damiani will be our keynote speaker at STM!Deadline Extension
30 June 2020. We are pleased to announce that the deadline of the submission has been extended. The new deadline is onCOVID-19 Update
18 May 2020. After assessment of the COVID-19 Pandemic, the ESORICS 2020 Organizing Committee has made the decision to move the conference and all associated workshops to an online format. Arrangements for the virtual format are being made and we will post updates as they are announced. This new format will not affect our proceedings, which will be published as Springer LNCS proceedings.About The Workshop
STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2020 is the sixteenth workshop in this series and will be held at the University of Surrey, Guildford, UK, in conjunction with the 25th European Symposium On Research in Computer Security (ESORICS 2020). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:
- Access control
- Anonymity
- Applied cryptography
- Authentication
- Data and application security
- Data protection
- Data/system integrity
- Digital rights management
- Economics of security and privacy
- Formal methods for security and trust
- Identity management
- Legal and ethical issues
- Mobile security
- Networked systems security
- Operating systems security
- Privacy
- Security and trust metrics
- Security and trust policies
- Security and trust management architectures
- Security and trust for big data
- Security and trust in cloud environments
- Security and trust in content delivery networks
- Security and trust in crowdsourcing
- Security and trust in social networks
- Security and trust in the Internet of Things
- Security and trust in pervasive computing
- Security and trust in services
- Security and Trust in edge computing
- Security and Trust in embedded systems and associated applications
- Security and Trust in block chain protocols and applications
- Social implications of security and trust
- Trust assessment and negotiation
Important Dates
-
July 13, 2020
Submission
-
August 10, 2020
Notification
-
August 18, 2020
Camera-ready
Instructions for paper submission
All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages in the LNCS format, including the bibliography and well-marked appendices.
All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers). The final version of an accepted paper must be in the format required for publication in the LNCS series. Authors should consult Springer's authors' guidelines and use their proceedings templates. Springer encourages authors to include their ORCIDs in their papers. Submissions not meeting these guidelines risk rejection without consideration of their merits. Submissions are to be made to the submission web site at:
https://easychair.org/conferences/?conf=stm2020
A paper submitted to STM 2020 cannot be under review for any other conference or journal during the time it is being considered for STM 2020. Furthermore, after you submit to STM 2020, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before/after submission of the paper to STM 2020, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers.
In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
Organizing Committees
Programme Co-chairs
Kostantinos Markantonakis, Information Security Dept., Royal Holloway, UK
Marinella Petrocchi, Institute for Informatics and Telematics, CNR, Pisa, Italy
Programme Committee
Sara Abugazalah, King Khalid University, Saudi Arabia
Raja Naeem Akram, Royal Holloway University, London, UK
Cristina Alcaraz, University of Malaga, Spain
Stefano Calzavara, Universita' Ca' Foscari Venezia, Italy
Lorenzo Cavallaro, King's College London, UK
Madeline Cheah, Horiba Mira, UK
Mauro Conti, University of Padua, Italy
Gabriele Costa, IMT School for Advanced Studies, Lucca, Italy
Haitham Cruickshank, University of Surrey, UK
Jorge Cuellar, Siemens AG, Germany
Sabrina De Capitani di Vimercati, University of Milano, Italy
Rocco De Nicola, IMT School for Advanced Studies, Lucca, Italy
Roberto Di Pietro, Hamad Bin Khalifa University, Doha, Qatar
Michela Fazzolari, IIT-CNR, Italy
Sara Foresti, Universita' degli Studi di Milano, Italy
Lettiero Galletta, IMT School for Advanced Studies, Lucca, Italy
Olga Gadyatskaya, LIACS, Leiden University, The Netherlands
Gerhard Hancke, City University of Hong Kong, Hong Kong
Thibaut Heckmann, ISG Smart Card and IoT Security Centre, London, UK
Julio Hernandez, University of Kent, UK
Darren Hurley-Smith, Royal Holloway University, London, UK
Christo Kaloniatis, University of the Aegean, Greece
Ghassan Karame, NEC Laboratories Europe, Germany
Niko Komninos, City University, London, UK
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Eleonora Losiouk, University of Padua, Italy
Emmanuel Magkos, Ionian University, Greece
Luigi Mancini, Universita' di Roma La Sapienza, Roma, Italy
Fabio Martinelli, IIT-CNR, Italy
Ilaria Matteucci, IIT-CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Keith Mayes, Royal Holloway University, London, UK
Nikolaos Petroulakis, Foundation for Research and Technology-Hellas (FORTH), Greece
Nikos Pitropakis, Edinburgh Napier University, UK
Joachim Possega, University of Passau, Germany
Konstantine Rantos, Eastern Macedonia and Thrace Institute of Technology, Kavala, Greece
Michael Rusinowitch, LORIA - INRIA Nancy, France
Pierangela Samarati, University of Milano, Italy
Damien Sauveron, University of Limoges, France
Daniele Sgandurra, Royal Holloway University, London, UK
Angelo Spognardi, Universita' di Roma La Sapienza, Roma, Italy
Mark Strembeck, Vienna University of Economics and Business, Vienna
Tom Van Goethem, KU Leuven, Belgium
Mathy Vanhoef, NYU Abu Dhabi, United Arab Emirates
Chan Yeob Yeun, Khalifa University, Abu Dhabi, United Arab Emirates
Chia-Mu Yu, National Chung Hsing University, Taiwan
Publicity Chair
Darren Hurley-Smith, Royal Holloway University, London
Web Chair
Michela Fazzolari, IIT-CNR, Italy
Program
List of accepted papers
This year for STM 2020, we have selected 8 of the 20 submitted papers. Following is the list of accepted papers, sorted by paper title. Notifications to all authors have also been sent by email.
- Vishal Arora and Manoj Misra. A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time
- Aynesh Sundararaj, Silvia Knittl and Jens Grossklags. Challenges in IT Security Processes and Solution Approaches with Process Mining
- Paul Wagner, Pascal Birnstill and Jürgen Beyerer. Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0
- Eden Abadi and Itay Hazan. Improved Feature Engineering for Free-Text Keystroke Dynamics
- Rajiv Ranjan Singh, Jose Moreira, Tom Chothia and Mark D. Ryan. Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties
- Yonas Leguesse, Mark Vella, Christian Colombo and Julio Hernandez-Castro. Reducing the Forensic Footprint with Android Accessibility Attacks
- Fabian Schillinger and Christian Schindelhauer. Revocable Access to Encrypted Message Boards
- Karim Baghery. Subversion-Resistant Commitment Schemes: Definitions and Constructions
STM 2020 Workshop Program
(Note: time is UK time)