(CSP EU FORUM) Brussels: 18-19 April 2013

Call For Poster Demonstrations - 2013

CSP EU Forum 2013 will host demo/poster sessions over the two day event. This will provide an excellent opportunity for leading members of commercial and academic research communities to interact and demonstrate the latest developments in on-going security research projects.


The typical purpose of  the Posters/Demonstrations is to disseminate specific research in relation to security and privacy, to encourage more interaction between researchers and to raise the profile of the research being conducted.

A quick overview for participants, including those responding to the calls for submissions, is available here.

We invite contributions from security research sectors that will demonstrate innovative technologies, or researched works. Posters/Demonstrations will be selected by the organising committee based on submissions.

The topics suggested by the conference can be discussed in terms of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies.

Proposals should be submitted via email by the:  13th February 2013

Important dates

  • Proposal submissions due: 13th February 2013
  • Acceptance decision:  WILL BE INFORMED BY 18th February 2013

Please email: 

Demonstrations Proposals (Format)
Submissions should clearly describe the functionality and detail the actual form of the demo ( ie what the participants will see and how they can interact with the demo, if possible).
Submissions should not exceed 2 pages in length. (Typically using 11pt font and single-column format) and should contain the following details:

  • Basic submission information, (submitter names, affiliations, contact information, title of demo and short abstract.)
  • The technology demonstrated.
  • The elements of novelty involved in the demo.
  • Detail any interactive part of the demo ( if this aspect is possible)  .
  • The equipment brought by the demonstrator
  • Photographs, screen shots, or videos showing the demo setup are welcome. (not subject to the 2 page limit)

In general demos are expected to be self contained (i.e. no special technical support required to be provided by the event organisers).

View "Submissions" page to download appropriate proposal template

Poster submissions ( format)

  • All poster submissions should consist of a one page PDF file , detailing the title and an abstract to provide an overview of the expected content of the poster.
  • Posters should be at a maximum A1 paper size (594 x 841 mm - 23.4 x 33.1 in).
  • A draft version of the poster is pdf format, can of course be submitted , but is not required.
  • A dedicated poster display area will be provided at the venue.

All submitted proposals will be reviewed by the CSP EU Forum 2013 organising committee ( taking into account aspects such as the level of novelty, conference relevance and topics covered).

Organising Committee
The CSP EU Forum 2013 organising committee will be responsible for reviewing workshop submissions:

Commitee members:

  •    Frances Cleary, TSSG, Waterford Institute of Technology
  •    Paul Malone, TSSG, Waterford Institute of Technology
  •    Michele Bezzi, SAP
  •    Massimo Felici, HP
  •    Fabio Massacci, UNITN
  •    Tom Curran TSSG, Waterford Institute of Technology


Topics include, but are not limited to:


Privacy and Data-protection                                         Trusted Systems                                                     
  • advances in authentication and identification
  • anonymity
  • identity management
  • biometrics – security and privacy
  • security and privacy metrics
  • data/system integrity
  • protection –information and infrastructure
  • operating systems security and privacy
  • security engineering
  • security architectures/security by design
  • security testing/ validation – formal methods
Security and Privacy in the cloud                         Foundations (computer science)
  • ad hoc networks
  • e-services
  • mobile systems
  • monitoring systems – personal/domestic/public
  • pervasive/ubiquitous computing
  • semantics
  • ontology
  • formal methods for security and privacy
  • knowledge extraction/representation for security
Crypto   Legal and social
  • applied cryptography
  • advances in cryptography: smaller/faster/specialised/…
  • human and social implications of security and privacy
  • trust management
  • legal and ethical issues
  • policies for security and privacy
Real World    
  • cyber warfare and security
  • protection from cyber-attack: defence and response
  • intrusion detection and prevention
  • complex systems security
  • data and application security
  • critical infrastructure protection
  • middleware security
  • network security
  • robustness and resilience
  • secure interoperability of systems and policies
  • secure service composition
  • security and privacy in social applications and networks
  • security and trust in the internet of things
  • security management in complex scenarios
  • software assurance and certification
  • threats, vulnerabilities, and risk management
  • usable security for complex systems
  • web service security