allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography

google+
Views: 758                 

When :  2018-10-19

Where :  Toronto

Submission Deadline :  2018-07-30

Categories :   Digital Signal & Image Processing ,  Cryptography ,  Computer Science & Information Technology ,  Multimedia, Computer Graphics & Animation

http://homomorphicencryption.org/workshops/wahc18/

6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC 2018)

October 19, 2018,Toronto

Call For Paper

Secure computation is becoming a key feature of future information systems. Distributed network applications and cloud architectures are at danger because lots of personal consumer data is aggregated in all kinds of formats and for various purposes. Industry and consumer electronics companies are facing massive threats like theft of intellectual property and industrial espionage. Public infrastructure has to be secured against sabotage and manipulation. A possible solution is encrypted computing: Data can be processed on remote, possibly insecure resources, while program code and data is encrypted all the time. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote system. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.

Topics of interest include, but are not limited to, the following topic areas: :

  • Software architectures for encrypted applications
  • Platform and system integration for encrypted applications
  • Algorithmic primitives for encrypted applications
  • Hybrid (partly encrypted) applications
  • Hardware implementations of encrypted computing
  • Implementation of homomorphic encryption schemes
  • Practical performance evaluations of homomorphic encryption schemes
  • Practical aspects of functional encryption
  • Privacy-preserving set operations
  • Secure information sharing
  • Circuit transformation of algorithms
  • Obfuscation techniques
  • Encrypted search schemes
  • Encrypted e-payment solutions
  • Encrypted financial transactions
  • Encrypted applications in bio-informatics

Important Dates

Submission Deadline: July 30, 2018
Notification of acceptance:: August 13, 2018
Camera-ready submission: August 19, 2018

User Name : alex
Posted 27-04-2018 on 18:48:44 AEDT


Related CFPs

CSIJ   Circuits and Systems: An International Journal
IJCI   International Journal on Cybernetics & Informatics
IJCACS   International Journal of Control, Automation, Communication and Systems
IJITCA   International Journal of Information Technology, Control and Automation

All Rights Reserved @ Call for Papers - Conference & Journals