what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Hashdays 2012 Call For Papers

Hashdays 2012 Call For Papers
Posted Jun 25, 2012
Site hashdays.ch

Hashdays 2012 Call For Papers - Hashdays is an international security technology and research conference offering both trainings/workshops and traditional presentation tracks. The event features many international IT security experts sharing their deep technical knowledge in an open environment and takes place October 31st to November 3rd, 2012 in Lucerne.

tags | paper, conference
SHA-256 | 6e0ac8238a53b8ebe88af5e47d06f685e8e944f0c7bdf03885eef4a921bcec0d

Hashdays 2012 Call For Papers

Change Mirror Download
Call for Papers for hashdays'12 (#days)
=======================================

Introduction
------------
hashdays is an international security technology and research conference
offering both trainings/workshops and traditional presentation tracks.
The event features many international IT security experts sharing their
deep technical knowledge in an open environment and takes place October
31st to November 3rd, 2012 in Lucerne. The conference is unique in
Switzerland and is organized by DEFCON Switzerland, a non-profit
association registered as a Defcon Group (DC4131,
http://www.defcon.org/html/defcon-groups/dc-groups-index.html) with the
aim to give experts and professionals a platform to transfer insights
into the information security domain and to sensitize users to
information security topics. The official conference web site is located
at: https://www.hashdays.ch.

We are happy to announce that the CFP is now open and we are accepting
interesting and innovative proposals for 50-minute talks. Please follow
the following guide for submitting.

Scope
-----
In particular, we are looking for topics in the following domains:
* Operating system and application security
* Wired and wireless network security
* Mobile communication security
* Forensics and anti-forensics
* Digital privacy and anonymous communication
* Reverse engineering of software and hardware
* Malware collection and analysis
* Botnet analysis
* Electronic voting
* Industrial espionage / industrial control system security
* Security metrics and visualization
* Intrusion detection and prevention
* Cloud computing security
* Cryptography and security protocols
* Biometric system security
* Quantitative and model based IT risk management

Submissions from academic and scientific institutions are welcome.

Deadlines
---------
Second submission round will end July 30 2012, 9pm CET. Notes of
Acceptance will be delivered shortly after but no later than August 12 2012.

Submission Guidelines
---------------------
The submission package is assessed by the program committee and the
author is notified on the outcome by electronic means. Your submission
package must be delivered to cfp@defcon-switzerland.org in
non-proprietary electronic formats (ASCII preferred, PDF, OpenOffice if
you can.t help it) and contain the following:

Talk details:
* Either:
o a proposal of your intended talk with at maximum 400 words XOR
o a full paper with a minimum of 6 and a maximum of 12 pages XOR
o a slide deck with a maximum of 45 slides
* 150 word abstract of the talk which will be displayed on our
conference website
* Rationale why your material is significant and should be presented
* Information on whether this talk has been or will be presented elsewhere
* Samples of other materials which might help to assess your submission
(optional)
* Links to your web presence, if relevant (optional)
* What are the key messages in your talk and what will the audience
learn from your talk

Presenter details:
* Your name and contact information
* Location of residence
* Country where the passport was issued
* Name of employer and/or affiliations (optional)
* 150 word biography of the speaker for use on our conference website
* A photo of yourself which is shown along with your biography (optional)
* List of previous significant talks (topic and name of conference)
* List of publications
* Name of employer and/or affiliations (if applicable)

Speaker Benefits
----------------
We offer the following benefits to accepted speakers:
* Free admission for the two conference days (including lunches and
coffee breaks)
* Invitation to the complimentary speaker's dinner
* Paid accommodation for two nights at the hotel where the conference
takes place
* Reimbursement of travel expenses in economy class up to a certain
amount (depending on your location)

Please note, that we are only able to reimburse travel expenses for one
(1) person per presentation.

Terms
-----
The author of the content keeps his or her full rights on the submitted
material. By submitting the CFP package the author agrees to the
following terms:
* You confirm that the material submitted is your own except for where
explicit references to third-party works are made.
* You confirm that you have obtained permission to use and distribute
third-party content, like images.
* You give permission to DEFCON Switzerland to publishing/distributing
your material either in physical or electronic format without royalty.
* You give permission to DEFCON Switzerland to create audio and video
recordings of your presentation and publish/distribute these without
royalty.
* You agree that travel and accommodation expenses are reimbursed only
upon successful delivery of your talk and upon presenting the receipts.
* You agree to reading out a disclaimer to the audience at the beginning
of your presentation if deemed necessary by DEFCON Switzerland.
* You agree not to hold DEFCON Switzerland liable for any direct or
indirect damages or costs in case the event is cancelled.

Sponsoring
----------
If you like our conference, you can support us by sponsoring. We offer
attractive sponsoring opportunities. For details please contact:
sponsoring at defcon-switzerland.org.

Thank you and best regards,
#days organizing committee


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close