[fc-announce] FC '23 -- Submission deadline Oct 19 (hard)

Christian Cachin cachin at inf.unibe.ch
Mon Oct 17 07:20:47 CEST 2022


Financial Cryptography and Data Security 2023
*********************************************

Twenty-Seventh International Conference
Bluesun Hotel Elaphusa
Bol, Brač, Croatia
May 1-5, 2023

https://fc23.ifca.ai


Financial Cryptography and Data Security is a major international forum for
research, advanced development, education, exploration, and debate
regarding information assurance, with a specific focus on commercial
contexts. The conference covers all aspects of securing transactions and
systems. Original works focusing on both fundamental and applied real-world
deployments on all aspects surrounding commerce security are
solicited. Submissions need not be exclusively concerned with
cryptography. Systems security and interdisciplinary works are particularly
encouraged.

The goal of the conference is to bring security and cryptography
researchers and practitioners together with economists, bankers,
implementers and policy-makers. Intimate and colourful by tradition, the FC
program features invited talks, academic presentations, technical
demonstrations and panel discussions. In addition, several workshops will
be held in conjunction with the FC conference.



CALL FOR PAPERS


DATES

Paper submission                                October 19, 2022
Paper notification                              January 19, 2023
Workshop and tutorial submission                October 1, 2022
  (for full consideration; later submissions considered on rolling basis)
Workshop and tutorial notification              October 15, 2022
  (for on-time submissions)
Panel and poster submission                     January 26, 2023
Panel and poster notification                   February 8, 2023
Final pre-proceedings papers                    February 28, 2023
Conference                                      May 1-5, 2023

All submissions are accepted until 23:59, AoE UTC-12.


CONTACT

fc23chair at ifca.ai


TOPICS

Access control, authorization and trust management
Anonymity and privacy enhancing technologies
Applied cryptography
Attacks, attack techniques, and attack case studies
Auctions and incentive design
Authentication, identity management and biometrics
Behavioral aspects of security and privacy
Blockchain applications
Blockchain protocols, proof-of-work, -stake, -burn
Censorship circumvention and resistance
Certification and audits
Cloud computing and data outsourcing security
Cryptographic protocols
Data security and privacy
Decentralized finance (DeFi)
Digital cash and payment systems
Digital rights management
Distributed consensus protocols
Economic and monetary aspects of cryptocurrencies
Economics of security and privacy
Electronic crime and underground markets
Electronic payments and ticketing systems
Empirical studies, real-world measurements and metrics
Forensics, monitoring and transaction graph analysis
Fraud detection and management
Game theory for security, privacy, and blockchain
Language-based security and formal verification
Legal and regulatory issues of blockchains, cryptocurrencies, and electronic payments
Machine learning and AI security
Malware and software security
Mobile payments
Network and distributed system security
Phishing and social engineering
Security of banking, financial services, and electronic commerce
Security of peer-to-peer networks
Smart contracts and financial instruments
Smartcards, secure tokens, and secure hardware
Surveillance and tracking
System security
Trusted execution environments (TEE), their security and applications
Usability and security
Web security
Zero-knowledge proofs


SUBMISSION

Contributions are sought in the following categories:

1. Research papers
  a. regular papers (15 pages + references and appendices),
  b. short papers (8 pages + references; no appendices), and
  c. systematization of knowledge (SoK) papers (20 pages + references and appendices)

2. Workshop proposals (2 pages),

3. Tutorial proposals (2 pages),

4. Panel proposals (2 pages), and

5. Posters (1 page).

Research paper submissions must be uploaded through the conference
submission website (accessible via the link provided
here). https://crypto.unibe.ch/fc23/

Workshop and tutorial proposals should be sent by email to
fc23workshops at ifca.ai, and panel proposals and posters by email to
fc23chair at ifca.ai, and should not be anonymized.  For more details, see the
corresponding sections below.


General Information

For each accepted paper/poster the conference requires at least one
registration at the general or academic rate, and paper authors must sign
the IFCA copyright form when submitting the final version. Alternatively,
individual papers can be published as fully open access--the publisher
charges authors a fee for this.


Format

Papers must be formatted in standard LNCS format
(https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines)
and submitted as PDF files. Submissions in other formats will be
rejected. All papers must be submitted electronically according to the
instructions and forms found here and at the submission site.


Anonymous Submission

Regular and short research paper submissions as well as SoKs must be
anonymized with no author names, affiliations, acknowledgments, or obvious
references.  Failure to properly anonymize submitted papers is grounds for
a desk rejection without review.  It is acceptable (but by no means
required) for submitted papers to be published online in non-anonymous form
(e.g., on authors' websites or archives like the Cryptology ePrint Archive
or arXiv.org).  Program committee members will be instructed not to
actively seek to de-anonymize papers.


Original submissions 

Authors may submit only work that does not substantially overlap with work
that is currently submitted or has been accepted for publication to any
other peer-reviewed conference/workshop with proceedings or a journal.  We
consider double submission serious research fraud and will treat it as
such.  Note that it is acceptable for papers to appear in non-peer-reviewed
formats (for example, as technical reports or in online archives such as
ePrint).  In case of doubt contact the program chairs for any
clarifications.

Authors are also required to read and follow information on ethics and
etiquette, available at https://fc23.ifca.ai/ethics.html.


Conflict of Interest

Authors must report in the submission site any conflicts with program
committee members.  A conflict exists if an author has the same affiliation
as a committee member, has ever acted as their PhD supervisor or been
supervised by them, or if they have been co-authors on a paper within the
past two years.


Resubmission to Affiliated Workshops

Papers that are submitted but ultimately not accepted to the main
conference may be considered for acceptance at one of the associated
workshops.  If you would like to take advantage of this, please indicate
this preference when submitting your paper.



EVALUATION CRITERIA

Regular Research Papers

Research papers should describe novel, previously unpublished scientific
contributions to the field, and they will be subject to rigorous peer
review.  Accepted submissions will be included in the conference
proceedings to be published in the Springer-Verlag Lecture Notes in
Computer Science (LNCS) series.  Submissions are limited to 15 pages in
standard LNCS format excluding references and appendices.  A total page
restriction may apply for the printed proceedings version.  Committee
members are not required to read the appendices, so the full papers should
be intelligible without them.

Short Papers

Short papers are also subject to peer review; however, the intention is to
encourage authors to introduce work in progress, novel applications, and
corporate/industrial experiences.  Short papers will be evaluated with a
focus on novelty and potential for sparking participants' interest and
future research avenues.  Short paper submissions are limited to 8 pages in
standard LNCS format, excluding references.  The title for short papers must
begin with the text "Short Paper:".  Accepted submissions will be included
in the conference proceedings.  The authors of some submissions not accepted
as regular research papers may be offered the option of acceptance as a short
paper.

Systematization of Knowledge Papers

We also solicit Systematization of Knowledge (SoK) papers.  To be suitable
for publication, SoK articles must provide an added value beyond a
literature review, such as novel insights, identification of research gaps,
or challenges to commonly held assumptions.  SoK paper submissions are
limited to 20 pages in standard LNCS format excluding references and
appendices.  Accepted submissions will be included in the conference
proceedings.  A total page restriction may apply for the printed
proceedings version.  Committee members are not required to read the
appendices, so the full papers should be intelligible without them.  The
paper title for systematization of knowledge papers must begin with the
text "SoK:".



WORKSHOP PROPOSALS

Proposals for workshops to be held in connection with the conference are
solicited.  A workshop can be a full day or half day in length.

Workshop proposals should include:

1. Title
2. (Draft) Call for papers
3. Brief summary and justification, including how it would fit into
the greater FC scope
4. (Tentative) Program committee and its chair(s)
5. One-paragraph biographies for key organizers, the expected (or
previous, if the workshop has been held in previous years) number of
submissions, participants and acceptance rates

Workshop proposals must not be anonymous and should be sent to
fc23workshops at ifca.ai.  Proposals received after the submission
deadline will be considered on a rolling basis for any remaining
slots.



TUTORIALS

Proposals for tutorials to be given in connection with the conference are
solicited.  A tutorial can be a full day or half day in length.

Tutorial proposals should include:

1. Title
2. Description
3. Name(s) of presenter(s)
4. Brief biographies for all presenters
5. Information about previous tutorials given by the presenter(s)

Tutorial proposals must not be anonymous and should be sent to
fc23workshops at ifca.ai (the same address as for workshop proposals).
Proposals received after the submission deadline will be considered on
a rolling basis for any remaining slots.



PANEL PROPOSALS

Panel Proposals should include a brief description of the panel topics, as
well as of the prospective panelists.  Accepted panel sessions will be
presented at the conference.  Please feel free to contact us directly if
you would like to further discuss the suitability of a certain topic.
Panel submissions must not be anonymous and should be up to 2 pages, sent
to fc23chair at ifca.ai.



POSTERS

The poster session is the perfect venue to share a provocative opinion,
interesting established or preliminary work, or a cool idea that will spark
discussion.  Poster presenters will benefit from a multi-hour session to
discuss their work, get exposure, and receive feedback from attendees.

Poster submissions should be a 1-page abstract (in the same LNCS format)
describing the poster.  Please keep in mind that the poster deadline is
later than the main paper notification deadline.  Poster proposals must not
be anonymous and should be sent to fc23chair at ifca.ai.



RUMP SESSION

The conference will also include the popular "rump session" held on one of
the evenings in an informal, social atmosphere.  The rump session is a
program of short (5 minutes), informal presentations on works in progress,
off-the-cuff ideas, and any other matters pertinent to the conference.  Any
conference attendee is welcome to submit a presentation to the Rump Session
Chair (to be announced at the conference).  This submission should consist
of a talk title, the name of the presenter, and, if desired, a very brief
abstract.  Submissions may be sent via e-mail or submitted in person in the
morning on the day of the session.



PROGRAM CHAIRS

Foteini Baldimtsi, George Mason University, fc23chair at ifca.ai
Christian Cachin, University of Bern, fc23chair at ifca.ai


PROGRAM COMMITTEE

Ghada Almashaqbeh, University of Connecticut
Zeta Avarikioti, TU Wien
Christian Badertscher, Input Output, Switzerland
Massimo Bartoletti, University of Cagliari
Rainer Böhme, University of Innsbruck
Joseph Bonneau, New York University and a16z Crypto Research
Benedikt Bünz, Stanford University
L. Jean Camp, Indiana University
Srdjan Capkun, ETH Zurich
Kostas Chalkias, Mysten Labs
T-H. Hubert Chan, University of Hong Kong
Panagiotis Chatzigiannis, Visa Research
Jeremy Clark, Concordia University
Vanesa Daza, Universitat Pompeu Fabra
Rafael Dowsley, Monash University
Stefan Dziembowski, University of Warsaw
Karim Eldefrawy, SRI International
Kaoutar Elkhiyaoui, IBM Research
Zeki Erkin, TU Delft
Chaya Ganesh, Indian Institute of Science, Bangalore
Christina Garman, Purdue University
Peter Gazi, Input Output, Slovakia
Rosario Gennaro, Protocol Labs
Arthur Gervais, Imperial College London
Ethan Heilman, BastionZero
Ari Juels, Cornell Tech
Aniket Kate, Purdue University and Supra Research
Lefteris Kokoris-Kogias, IST Austria
Evgenios M. Kornaropoulos, George Mason University
Duc V. Le, University of Bern
Andrew Lewis-Pye, LSE
Ben Livshits, Imperial College London and Brave Software
Giorgia Azzurra Marson, NEC Labs Europe
Shin'ichiro Matsuo, Georgetown University
Patrick McCorry, Infura
Ian Miers, University of Maryland
Andrew Miller, University of Illinois at Urbana-Champaign
Pedro Moreno-Sanchez, IMDEA Software Institute
Kartik Nayak, Duke University
Valeria Nikolaenko, Andreesen-Horowitz - a16z crypto research
Anca Nitulescu, Protocol Labs
Giorgos Panagiotakos, Input Output, United Kingdom
Dimitris Papadopoulos, Hong Kong University of Science and Technology
Charalampos Papamanthou, Yale University
Alexandros Psomas, Purdue University
Elizabeth A. Quaglia, Royal Holloway, University of London
Ling Ren, University of Illinois at Urbana-Champaign
Ori Rottenstreich, Technion
abhi shelat, Northeastern University
Alberto Sonnino, Mysten Labs
Alessandro Sorniotti, IBM Research - Zurich
Alexander Spiegelman, Aptos Labs
Chrysoula Stathakopoulou, Chainlink Labs
Vanessa Teague, Thinking Cybersecurity and the Australian National University
Marie Vasek, University College London
Roger Wattenhofer, ETH Zurich
Edgar Weippl, University of Vienna, SBA Research
Fan Zhang, Yale University
Haibin Zhang, Beijing Institute of Technology
Ren Zhang, Cryptape Co. Ltd. and Nervos
Yupeng Zhang, Texas A&M University
Hong-Sheng Zhou, Virginia Commonwealth University
Dionysis Zindros, Stanford University
Aviv Zohar, The Hebrew University



More information about the fc-announce mailing list