what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

PASSWORDS'14 Norway Call For Papers

PASSWORDS'14 Norway Call For Papers
Posted Sep 15, 2014
Authored by Per Thorsheim

The PASSWORDS'14 Norway Call For Papers has been announced. It will take place December 8th through the 10th, 2014 in Trondheim, Norway.

tags | paper, conference
SHA-256 | a270ae5136e49e09f525068c54f96fe43d036add98f294ae63d3bfe720c708fa

PASSWORDS'14 Norway Call For Papers

Change Mirror Download


The 7th International Conference on Passwords
8-10 December 2014

The Passwords conference was launched in 2010 as a response to the lack
of robustness and usability of current personal authentication practices
and solutions. Annual participation has doubled over the past three years.

Venue: NTNU campus, Trondheim, Norway.

Conference Aim

The technical and practical problem addressed by the conference is
illustrated by the fact that more than half a billion user passwords
have been compromised over the last five years, including breaches at
internet companies such as Adobe, Twitter, Forbes, LinkedIn, Yahoo, and
LivingSocial. Yet passwords, PIN codes, and similar remain the most
prevalent method of personal authentication. Clearly, we have a systemic

Passwords is the singular conference gathering researchers, password
crackers, and enthusiastic experts from around the globe, aiming to
better understand the challenges surrounding the methods personal
authentication and passwords, and how to adequately solve these
problems. The Passwords conference series seek to provide a friendly
environment for participants with plenty opportunity to communicate with
the speakers before, during, and after their presentations.


This call for papers seeks original contributions that present attacks,
analyses, designs, applications, protocols, systems, practical
experiences, and theory. Submitted papers may include, but are not
limited to, the following topics, all related to passwords and personal

Best practice reports
Costs and economy
Cryptanalytic attacks
Cryptographic formal attack models
Cryptographic protections
Cryptographic protocols
Dictionary attacks
Digital forensics
Gestures and graphical patterns
Guessing attacks
Hash functions
Human factors and behavior
Implementations and tests
Incident and attack reports
Key-stroke dynamics
Languages, letters and symbols
Management and authorization
Markov models
One-time passwords
Passphrase techniques
Password based encryption
Password based key derivation
Password based key exchange
Password protection
Password replacements
Passwords and biometrics
Performance and scalability
Physical traces and smudges
Rainbow tables and trade-offs
Reset and recovery procedures
Side-channel attacks
Single sign-on
Social engineering
Statistical patterns and analyses
Time-memory tradeoffs
Tokens and devices
Usability studies

We seek submissions for review in the following three categories:

(i) Research Papers (ii) Short papers (iii) Tutorials

Instructions for paper submission

Accepted papers presented at the workshop will be included in the event
proceedings and published by Springer in the Lecture Notes in Computer
Science (LNCS) series. All submission must be done at

Research Papers should describe novel, previously unpublished technical
contributions within the scope of the call. The papers will be in-depth
reviewed and selected using a double-blind review process by at least
three members of the program committee. Paper length is limited to 16
pages (LNCS format) excluding references and well-marked appendices. The
paper submitted for review must be anonymous, hence author names,
affiliations, acknowledgements, or obvious references must be
temporarily edited out for the review process. The submitted paper (PDF
or PostScript format) must follow the template described by Springer at

Short Papers will also be subject to peer review, where the emphasis
will be put on work in progress, hackers achievements, industrial
experiences, and incidents explained, aiming at novelty and promising
directions. Short paper submissions should not be more than 6 pages in
standard LNCS format in total. A short paper must be labeled by the
subtitle "Short Paper." Accepted short paper submissions may be included
in the conference proceedings. Short papers do not need to be anonymous.
The program committee may accept full research
papers as short papers.

Tutorial proposals are expected to explain new methods, techniques,
tools, systems, and services within the Passwords scope. The time frame
is one hour. Proposals can be submitted in any format. Publication will
be by streaming, video and web.

Important dates

Papers: Submissions by October 27.
Acceptance notification: November 10, 2014.
Tutorials: Proposals by November 10, 2014.

Conference Organizing Chair

Per Thorsheim, God Praksis AS

Technical Papers Program Committee

Stig F. Mjolsnes, (chair) Norwegian University of Science and Technology (N)
Jean-Phillipe Aumasson, Kudelski Security (CH)
Markus Durmuth, Ruhr-University Bochum (D)
Jeremy Gosney, Stricture Consulting Group (USA)
Tor Helleseth, University of Bergen (N)
Audun Josang, University of Oslo (N)
Stefan Lucks, Bauhaus-University Weimar (D)
Markku-Juhani O. Saarinen, ERCIM Research Fellow at NTNU (N)
Frank Stajano, University of Cambridge (UK)
Kenneth White, Open Crypto Audit Project (USA)


FRISC, a research value network funded by the Norwegian Research Council.
Login or Register to add favorites

File Archive:

November 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    1 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    219 Files
  • 14
    Nov 14th
    19 Files
  • 15
    Nov 15th
    66 Files
  • 16
    Nov 16th
    38 Files
  • 17
    Nov 17th
    9 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    11 Files
  • 22
    Nov 22nd
    56 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    36 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    14 Files
  • 28
    Nov 28th
    30 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By