For the first time, this year ESORICS will include a poster session on the evening of September 23. The poster session is ideal to share preliminary or established research and to spark discussion. Poster presenters will enjoy a multi-hour session to describe their work and get feedback from attendees.
- Home >
- Poster session
Poster Session
An ESORICS Premiere
Accepted Posters
- Shielding Vulnerable Smart Contracts
- Christof Ferreira Torres, SnT, University of Luxembourg, Luxembourg, Luxembourg
- Mathis Baden, SnT, University of Luxembourg, Luxembourg, Luxembourg
- Robert Norvill, SnT, University of Luxembourg, Luxembourg, Luxembourg
- Hugo Jonker, Open University of the Netherlands, Heerlen, Netherlands & Radboud University, Nijmegen, Netherlands
- Sensitive User Data Monitoring and Privacy Leakage Detection on the Web
- Michalis Pachilakis, IBM Research, Ireland
- Stefano Braghin, IBM Research, Ireland
- Killian Levacher, IBM Research, Ireland
- Spiros Antonatos, IBM Research, Ireland
- GDPR and Online-Advertising
- Tobias Urban, Institute for Internet Security, Germany & Ruhr University Bochum, Germany
- Dennis Tatang, Ruhr University Bochum, Germany
- Martin Degeling, Ruhr University Bochum, Germany
- Thorsten Holz, Ruhr University Bochum, Germany
- Norbert Pohlmann, Institute for Internet Security, Germany
- Cookie Setting Practices in the Wild
- Tobias Urban, Institute for Internet Security, Germany & Ruhr University Bochum, Germany
- Martin Degeling, Ruhr University Bochum, Germany
- Thorsten Holz, Ruhr University Bochum, Germany
- Norbert Pohlmann, Institute for Internet Security, Germany
- Differential Privacies
- Damien Desfontaines, ETH Zurich / Google
- Balazs Pejo, University of Luxembourg
- A Chain Code Mechanism with Data Encryption on Hyperledger Fabric
- Hideharu Kojima, Graduate School of Information Science and Technology, Osaka University, 1-5, YamadaOka, Suita, JAPAN
- Naoto Yanai, Graduate School of Information Science and Technology, Osaka University, 1-5, YamadaOka, Suita, JAPAN
- Ordinos: A Verifiable Tally-Hiding E-Voting System
- Ralf Kusters, University of Stuttgart
- Julian Liedtke, University of Stuttgart
- Johannes Muller, University of Luxembourg
- Daniel Rausch, University of Stuttgart
- Andreas Vogt, FHNW Switzerland
- Dark Patterns: Deception or Simply Bad Design?
- Arianna Rossi, SnT, University of Luxembourg
- Gabriele Lenzini, SnT, University of Luxembourg
- Vincent Koenig, COSA, University of Luxembourg
- Testing of GDPR-based Access Control Policies
- Cesare Bartolini, SnT, University of Luxembourg
- Said Daoudagh, ISTI- CNR, Pisa, Italy & Computer Science Department, University of Pisa, Italy
- Gabriele Lenzini, SnT, University of Luxembourg
- Eda Marchetti, ISTI- CNR, Pisa, Italy
- Health Access Broker: Securing Personal Health Records in Public Clouds
- Zainab Abaid, University of New South Wales, Sydney, Australia
- Arash Shaghaghi, Deakin University, Melbourne, Australia & University of New South Wales, Sydney, Australia
- Suranga Seneviratne, University of Sydney, Australia
- Aruna Seneviratne, University of New South Wales, Sydney, Australia & Data61, CSIRO, Australia
- Sanjay Jha, University of New South Wales, Sydney, Australia
- Detecting misalignments between system security and user perceptions — a socio-technical analysis of an end-to-end email encryption system
- Borce Stojkovski, SnT, University of Luxembourg
- Itzel Vazquez Sandoval, SnT, University of Luxembourg
- Gabriele Lenzini, SnT, University of Luxembourg
- Shepherd Enabling large-scale post-login studies
- Hugo Jonker, Open Universiteit, Heerlen, Netherlands & iCIS Institute, Radboud University, Nijmegen, Netherlands
- Jelmer Kalkmann, Open Universiteit, Heerlen, Netherlands
- Benjamin Krumnow, Technische Hochschule Koln, Germany & Open Universiteit, Heerlen, Netherlands
- Alan Verresen, Open Universiteit, Heerlen, Netherlands
- Marc Sleegers, Open Universiteit, Heerlen, Netherlands
How to submit
Authors are asked to submit a 2-page abstract in LNCS format that describes the main contributions of the poster. Proposals should emphasize the motivation for the work and summarize the results being presented.
The abstracts must not be anonymous, and must contain the authors’ names, affiliations, and contact information. The title must begin with the keyword “POSTER:”. Submissions that are not formatted as described above risk rejection without review. At least one presenter per accepted poster must attend the conference. The poster should be submitted by email to posters-esorics2019 [at] uni [dot] lu
The participants will have to print and bring the posters (A0 format preferred) themselves and neither the abstracts nor the posters will appear in the proceedings.
Topics of interest include, but are not limited to:
Important dates
Submission deadline: Thursday, August 1, 2019
Author notification: Thursday, August 15, 2019
Poster Chair
Alfredo Rial, University of Luxembourg
Email: posters-esorics2019 [at] uni [dot] lu
Access control
Accountability
Ad hoc networks
Anonymity
Applied cryptography
Authentication
Biometrics
Blockchain and finance security
Data and computation integrity
Database security
Data protection
Deep learning for attack and defense
Digital content protection
Digital forensics
Distributed systems security
Embedded systems security
Inference control
Information hiding
Identity management
Information flow control
Information security governance and management
Intrusion detection
Formal security methods
Language-based security
Network security
Phishing and spam prevention
Privacy
Privacy preserving data mining
Risk analysis and management
Secure electronic voting
Security architectures
Security economics
Security metrics
Security models
Security and privacy for big data
Security and privacy in cloud scenarios
Security and privacy in complex systems
Security and privacy in content centric networking
Security and privacy in crowdsourcing
Security and privacy in the IoT
Security and privacy in location services
Security and privacy for mobile code
Security and privacy in pervasive / ubiquitous computing
Security and privacy policies
Security and privacy in social networks
Security and privacy in web services
Security and privacy in cyber-physical systems
Security, privacy and resilience in critical infrastructures
Security verification
Software security
Systems security
Trust models and management
Trustworthy user devices
Usable security and privacy
Web security
Wireless security
Program committee for poster session
Gunes Acar, Princeton University
Josep Balasch, KU Leuven
Cecilia Boschini, IBM Research – Zurich
Kovila Coopamootoo, Newcastle University
Constantin Catalin Dragan, University of Surrey
Chloe R. Martindale, Eindhoven University of Technology
Mustafa A. Mustafa, University of Manchester
Alfredo Rial, University of Luxembourg
Daniele Sgandurra, Royal Holloway – University of London