Conference Information
PETS 2020: Privacy Enhancing Technologies Symposium
Submission Date:
Notification Date:
Conference Date:
Montreal, Canada
CCF: c   CORE: b   Viewed: 14123   Tracked: 53   Attend: 2

Conference Location
Call For Papers
Papers submitted to PETS/PoPETs should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. Note that a paper's relevance to privacy applications is crucial for our community. PETS is friendly to topics from the wider area of security and privacy (cryptographic primitives, security mechanisms, differentially-private mechanisms, etc.) as long as it is clear how these serve to improve or understand privacy in technology (e.g., it includes a use case, evaluation on real data, integration with an application, etc.).
Suggested topics include but are not restricted to:

    Access control and identity management with privacy
    Anonymous communication and censorship resistance
    Blockchain privacy
    Building and deploying privacy-enhancing systems
    Cloud computing and privacy
    Cryptographic tools for privacy
    Data protection technologies
    Defining and quantifying privacy
    Differential privacy and private data analysis
    Economics and game-theoretical approaches to privacy
    Forensics and privacy
    Genomic and medical privacy
    Human factors, usability, and user-centered design of privacy technologies
    Information leakage, data correlation, and abstract attacks on privacy
    Interdisciplinary research connecting privacy to economics, law, psychology, etc.
    Location privacy
    Machine learning and privacy
    Measurement of privacy in real-world systems
    Mobile devices and privacy
    Policy languages and tools for privacy
    Profiling and data mining
    Social network privacy
    Traffic analysis
    Transparency, robustness, and abuse in privacy systems
    Web privacy

We also solicit Systematization of Knowledge (SoK) papers on any of these topics: papers putting together existing knowledge under some common light (adversary model, requirements, functionality offered, etc.), providing novel insights, identifying research gaps or challenges to commonly held assumptions, etc. Survey papers, without such contributions, are not suitable. SoK submissions should include "SoK:" in their title and check the corresponding option in the submission form.
Last updated by Dou Sun in 2019-04-26
Acceptance Ratio
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
TPNCInternational Conference on the Theory and Practice of Natural Computing2019-08-072019-08-312019-12-09
cSPICESoftware Process Improvement and Capability Determination2017-06-122017-07-072017-10-04
ICETInternational Conference on Emerging Technologies2018-08-152018-09-152018-11-21
cb3CIBCBIEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology2016-05-152016-06-302016-10-05
WCIInternational Symposium on Women in Computing and Informatics2015-04-192015-05-152015-08-10
BSidesBudBSides Budapest IT Security Conference2019-01-15 2019-03-28
ICCGIInternational Multi-Conference on Computing in the Global Information Technology 2013-04-162013-07-21
SCIAScandinavian Conference on Image Analysis2013-02-012013-03-102013-06-17
NCS''Annual National Cyber Security Summit2018-01-152018-03-012018-06-05
ICSCEEIEEE International Conference on Smart Computing and Electronic Enterprise2018-04-162018-04-202018-07-11
Related Journals