STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2023 is the nineteenth workshop in this series and will be held in The Hague, Netherlands, in conjunction with the 28th European Symposium On Research in Computer Security (ESORICS 2023). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:
Paper Submission | Author Notification | Camera Ready |
---|---|---|
July 14, 2023 | August 16, 2023 | August 20, 2023 |
All deadlines are at 11.59PM / 23:59 American Samoa Time
Submissions are to be made to via EasyChair. At least one author of accepted papers must guarantee that they will present their paper at the workshop.
All submissions must be written in English, and only PDF files will be accepted (a Latex source file will be required for the final version of accepted papers). All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages in the LNCS format, excluding the bibliography and well-marked appendices, and at most 20 pages in total.
A paper submitted to STM 2023 cannot be under review for any other conference or journal during the time it is being considered for STM 2023. Furthermore, after you submit to STM 2023, you must await our response before submitting elsewhere. If you submit your paper to another conference or journal either before or after submission of the paper to STM 2023, we will reject your paper without review and will also notify the other conference/journal. This restriction applies to identical as well as to substantially similar papers.
As in previous years, the proceedings will be published online by Springer in the Lecture Notes in Computer Science (LNCS) series (past STM proceedings are available here). As such, the final version of an accepted paper must be in the format required for publication in the LNCS series. Authors should consult Springer's authors' guidelines and use their proceedings templates. Springer encourages authors to include their ORCIDs (https://goo.gl/hbsa4D) in their papers. Submissions not meeting these guidelines risk rejection without consideration of their merits.
In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
(Note: presentation times include 5 mins for Q&A)
09:00 - 09:10 | WELCOME |
---|---|
09:00 - 09:10 | Workshop chairs: Ruben Rios and Joachim Posegga |
09:10 - 10:40 | SESSION 1: IDENTITIES |
09:10 - 09:40 | Lydia Ouaili.Impact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity |
09:40 - 10:10 | Pavlo Kolesnichenko, Dmytro Progonov, Valentyna Cherniakova, Andriy Oliynyk and Oleksandra Sokol.Biometric-Based Password Management |
10:10 - 10:40 | Tobias Hilbig, Thomas Schreck and Tobias Limmer.'State of the Union': Evaluating Open Source Zero Trust Components |
10:40 - 11:15 | COFFEE BREAK |
11:15 - 12:00 | ERCIM STM PhD AWARD |
11:15 - 12:00 | Juan E. Rubio. Analysis and Design of Security Mechanisms in the Context of Advanced Persistent Threats Against Critical Infrastructures |
12:00 - 13:00 | LUNCH BREAK |
13:00 - 14:20 | SESSION 2: PRIVACY |
13:00 - 13:30 | Ivone Amorim, Pedro Barbosa, Eva Maia and Isabel Praça. Privacy-Preserving NN for IDS: A Study on the impact of TFHE constraints |
13:30 - 13:55 | Jan Willemson. Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System |
13:55 - 14:20 | Marietjie Botes.Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance |
14:20 - 15:00 | COFFEE BREAK |
15:00 - 16:20 | SESSION 3: APPLICATION SCENARIOS |
15:00 - 15:30 | Emiliia Geloczi, Felix Klement, Eva Gründinger and Stefan Katzenbeisser.Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things |
15:30 - 15:55 | Isaac Henderson Johnson Jeyakumar, John Walker and Heiko Rossnagel.Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case |
15:55 - 16:20 | Henrich Pöhls.Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems |
16:20 - 16:30 | CLOSING REMARKS |
Any doubts or queries can be addressed to the PC Chairs using the following emails: