{"id":265,"date":"2016-08-23T17:04:25","date_gmt":"2016-08-23T15:04:25","guid":{"rendered":"http:\/\/members.loria.fr\/SKremer\/?page_id=265"},"modified":"2025-08-22T10:24:44","modified_gmt":"2025-08-22T08:24:44","slug":"committees","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/SKremer\/committees\/","title":{"rendered":"Committees"},"content":{"rendered":"<h1>Steering Committees<\/h1>\n<ul>\n<li><a href=\"http:\/\/www.ieee-security.org\/CSFWweb\/\">IEEE Computer Security Foundations Symposium<\/a> (CSF)<\/li>\n<li><a href=\"http:\/\/www.etaps.org\">Conference on Principles of Security and Trust<\/a> (POST) 2012-2016<\/li>\n<li><a href=\"http:\/\/www.etaps.org\/\">European Joint Conferences on Theory and Practice of Software <\/a> (ETAPS) 2012-2014<\/li>\n<\/ul>\n<h1>Program Committees<\/h1>\n<ul>\n<li><a href=\"https:\/\/sp2026.ieee-security.org\/\"><abbr title=\"47th IEEE Symposium on Security and Privacy\">S&amp;P&#8217;26<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\"><abbr title=\"33rd USENIX Security Symposium\">Usenix Security&#8217;25<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/csf2024.ieee-security.org\/\"><abbr title=\"37th IEEE Computer Security Foundations Symposium\">CSF&#8217;24<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity24\"><abbr title=\"33rd USENIX Security Symposium\">Usenix Security&#8217;24<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/petsymposium.org\/cfp24.php\"><abbr title=\"24th Privacy Enhancing Technologies Symposium\">PETS&#8217;24<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2023\/\"><abbr title=\"ACM Conference on Computer and Communications Security\">CCS&#8217;23<\/abbr><\/a> (track chair)<\/li>\n<li><a href=\"https:\/\/petsymposium.org\/cfp23.php\"><abbr title=\"23rd Privacy Enhancing Technologies Symposium\">PETS&#8217;23<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity23\"><abbr title=\"32nd USENIX Security Symposium\">Usenix Security&#8217;23<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/esorics2022.compute.dtu.dk\/\"><abbr title=\"27th European Symposium on Research in Computer Security\">ESORICS&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/e-vote-id.org\/\"><abbr title=\"7th International Joint Conference on Electronic Voting\">E-Vote-ID&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/movep2022.cs.aau.dk\/\"><abbr title=\"Summer school on modelling and verification of parallel processes\">MOVEP&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/EuroSP2022\/index.html\"><abbr title=\"7th IEEE European Symposium on Security and Privacy\">Euro S&amp;P&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/petsymposium.org\/cfp22.php\"><abbr title=\"22nd Privacy Enhancing Technologies Symposium\">PETS&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/indocrypt2021.lnmiit.ac.in\/\"><abbr title=\"22nd International Conference on Cryptology in India\">Indocrypt&#8217;21<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/esorics2021.athene-center.de\/\"><abbr title=\"26th European Symposium on Research in Computer Security\">ESORICS&#8217;21<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/e-vote-id.org\/\"><abbr title=\"6th International Joint Conference on Electronic Voting\">E-Vote-ID&#8217;21<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/EuroSP2021\/index.html\"><abbr title=\"6th IEEE European Symposium on Security and Privacy\">Euro S&amp;P&#8217;21<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/indocrypt2020.iiitb.ac.in\/\"><abbr title=\"21st International Conference on Cryptology in India\">Indocrypt&#8217;20<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.surrey.ac.uk\/esorics-2020\"><abbr title=\"25th European Symposium on Research in Computer Security\">ESORICS&#8217;20<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/EuroSP2020\/\"><abbr title=\"5th IEEE European Symposium on Security and Privacy\">Euro S&amp;P&#8217;20<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/CSF2020\/\"><abbr title=\"33rd IEEE Computer Security Foundations Symposium\">CSF&#8217;20<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.fsttcs.org.in\/2019\/\"><abbr title=\"39th IARCS Annual Conference on\nFoundations of Software Technology and Theoretical Computer Science\">FSTTCS&#8217;19<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/esorics2019.uni.lu\/\"><abbr title=\"24th European Symposium on Research in Computer Security\">ESORICS&#8217;19<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/conf.researchr.org\/track\/etaps-2019\/perr-2019-papers\"><abbr title=\"3rd Workshop on Program Equivalence and Relational Reasoning\">PERR&#8217;19<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/EuroSP2019\/\"><abbr title=\"4th IEEE European Symposium on Security and Privacy\">Euro S&amp;P&#8217;19<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/esorics2018.upc.edu\/\"><abbr title=\"23rd European Symposium on Research in Computer Security\">ESORICS&#8217;18<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/mfcs2018.csc.liv.ac.uk\/\"><abbr title=\"43rd International Symposium on Mathematical Foundations of Computer Science\">MFCS&#8217;18<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/fc18.ifca.ai\/voting\/\"><abbr title=\"3rd Workshop on Advances in Secure Electronic Voting\">Voting&#8217;18<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/EuroSP2018\/\"><abbr title=\"3rd IEEE European Symposium on Security and Privacy\">Euro S&amp;P&#8217;18<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/plas2017.cse.buffalo.edu\/\"><abbr title=\"ACM SIGSAC Workshop on Programming Languages and Analysis for Security\">PLAS&#8217;17<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.ntnu.edu\/web\/esorics2017\/european-symposium-on-research-in-computer-security\"><abbr title=\"22nd European Symposium on Research in Computer Security\">ESORICS&#8217;17<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/fc17.ifca.ai\/voting\/\"><abbr title=\"2nd Workshop on Advances in Secure Electronic Voting\">Voting&#8217;17<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/www.ieee-security.org\/TC\/EuroSP2017\/index.php\"> <abbr title=\"2nd IEEE European Symposium on Security and Privacy \">Euro S&amp;P&#8217;17<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.fsttcs.org.in\/archives\/2016\/\"><abbr title=\"36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science\">FSTTCS&#8217;16<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/www.ics.forth.gr\/esorics2016\/\"> <abbr title=\"21st European Symposium on Research in Computer Security\">ESORICS&#8217;16<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/csf2016.tecnico.ulisboa.pt\/\"> <abbr title=\"29th IEEE Computer Security Foundations Symposium\">CSF&#8217;16<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/fc16.ifca.ai\/voting\/\"> <abbr title=\"1st Workshop on Advances in Secure Electronic Voting\">Voting&#8217;16<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/meeting.xidian.edu.cn\/conference\/AsiaCCS2016\/\"><abbr title=\"11th ACM Symposium on Information, Computer and Communications Security\">AsiaCCS&#8217;16<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/anss.org.au\/ACISP2016\/\"><abbr title=\"21st Australasian Conference on Information Security and Privacy\">ACISP&#8217;16<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/tgc2015.disia.unifi.it\/\"><abbr title=\"10th International Symposium on Trustworthy Global Computing \">TGC&#8217;15<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/software.imdea.org\/%7Ebkoepf\/FCS15\/\"><abbr title=\"Workshop on Foundations of Computer Security\">FCS&#8217;15<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/www.cryptoforma.org.uk\/event\/4thworkshopcsf\/\"><abbr title=\"4th International CryptoForma Workshop 2015\">CryptoForma&#8217;15<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/esorics2015.sba-research.org\/\"><abbr title=\"20th European Symposium on Research in Computer Security\">ESORICS&#8217;15<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/icsd.i2r.a-star.edu.sg\/asiaccs15\/\"><abbr title=\"10th ACM Symposium on Information, Computer and Communications Security\">AsiaCCS&#8217;15<\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/icfem2014.uni.lu\/\"><abbr title=\"16th International Conference on Formal Engineering Methods\">ICFEM&#8217;14<\/abbr><\/a><\/li>\n<li><abbr title=\"12th International Conference on Applied Cryptography and Network Security\">ACNS&#8217;14 <\/abbr><\/li>\n<li><a href=\"https:\/\/www.dmi.unict.it\/~giamp\/sac\/cfp2014.php\"><abbr title=\"3th edition of the Computer Security track at the 29th ACM Symposium on Applied Computing\">SEC@SAC&#8217;14<\/abbr><\/a>: co-chair with Giampaolo Bella and Manuel Barbosa<\/li>\n<li><a href=\"http:\/\/www.etaps.org\/2014\/post\"><abbr title=\"3rd Conference on Principles of Security and Trust\"> POST&#8217;14<\/abbr><\/a>: co-chair with Mart\u00edn Abadi<\/li>\n<li><a href=\"http:\/\/rv2013.gforge.inria.fr\/\"><abbr title=\"4th International Conference on Runtime Verification\">RV&#8217;13 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/trust.csu.edu.cn\/conference\/ispec2013\/\"><abbr title=\"9th International Conference on Information Security Practice and Experience\">ISPEC&#8217;13 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/www.etaps.org\/2013\/post\"><abbr title=\"2nd Conference on Principles of Security and Trust\">PoST&#8217;13 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/www.cs.bham.ac.uk\/~mdr\/research\/projects\/12-TGC\/\"><abbr title=\"7th International Symposium on Trustworthy Global Computing\">TGC&#8217;12 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/www.fsttcs.org\/archives\/2012\/\"><abbr title=\"32nd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience\">FSTTCS&#8217;12 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/csf2012.seas.harvard.edu\/\"><abbr title=\"25th IEEE Computer Security Foundations Symposium\">CSF&#8217;12 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/icsd.i2r.a-star.edu.sg\/acns2012\/\"><abbr title=\"10th International Conference on Applied Cryptography and Network Security\">ACNS&#8217;12 <\/abbr><\/a><\/li>\n<li><abbr title=\"8th International Conference on Information Security Practice and Experience\">ISPEC&#8217;12 <\/abbr><\/li>\n<li><a href=\"http:\/\/www.etaps.org\/2012\/post\"><abbr title=\"1st Conference on Principles of Security and Trust\">PoST&#8217;12 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/www.iit.cnr.it\/FAST2011\/\"><abbr title=\"8th International Workshop on Formal Aspects of Security and Trust\">FAST&#8217;11 <\/abbr><\/a><\/li>\n<li><abbr title=\"9th Annual Conference on Privacy, Security and Trust\">PST&#8217;11 <\/abbr><\/li>\n<li><a href=\"http:\/\/users.dsic.upv.es\/workshops\/secret2010\/\"><abbr title=\"5th International Workshop on Security and Rewriting Techniques\">SecReT&#8217;10<\/abbr><\/a>: co-chair with Paliath Narendran<\/li>\n<li><a href=\"http:\/\/old.automata.rwth-aachen.de\/movep2010\/\"><abbr title=\"Modelling and Verifying Parallel Processes\">MoVeP&#8217;10 <\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.uclouvain.be\/crypto\/wissec2009\/\"><abbr title=\"4th Benelux Workshop on Information and System Security\">WISSEC&#8217;09<\/abbr><\/a><\/li>\n<li><abbr title=\"7th International Workshop on Security Issues in Concurrency\">SecCo&#8217;09<\/abbr>: co-chair with Michele Boreale<\/li>\n<li><a href=\"https:\/\/www.cylab.cmu.edu\/asian09\/\"><abbr title=\"13th Annual Asian Computing Science Conference\">ASIAN&#8217;09 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/voteid2009.uni.lu\/\"><abbr title=\"Second international conference on E-voting and Identity\">VOTE-ID&#8217;09 <\/abbr><\/a><\/li>\n<li><abbr title=\"6th International Workshop on Security Issues in Concurrency\">SecCo&#8217;08<\/abbr>: co-chair with Prakash Panangaden<\/li>\n<li><a href=\"https:\/\/www.cs.utexas.edu\/~shmat\/FMSE08\/\"><abbr title=\"6th ACM Workshop on Formal Methods in Security Engineering\">FMSE&#8217;08 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/events.cs.bham.ac.uk\/icics08\/\"><abbr title=\"10th International Conference on Information and Communications Security\">ICICS&#8217;08 <\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.uclouvain.be\/crypto\/WOTE2008\/Main_Page.html\"><abbr title=\"IAVoSS Workshop On Trustworthy Elections\">WOTE&#8217;08 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/isc08.twisc.org\/\"><abbr title=\"11th Information Security Conference\">ISC&#8217;08 <\/abbr><\/a><\/li>\n<li><abbr title=\"4th Information Security Practice and Experience Conference\">ISPEC&#8217;08 <\/abbr><\/li>\n<li><a href=\"http:\/\/www.iavoss.org\/mirror\/wote2007\/\"><abbr title=\"IAVoSS Workshop On Trustworthy Elections\">WOTE&#8217;07 <\/abbr><\/a><\/li>\n<li><a href=\"http:\/\/www.sersc.org\/MUE2007\/contents\/page\/IMIS2007.html\"><abbr title=\"Interactive Multimedia \\&amp; Intelligent Services in Mobile and Ubiquitous Computing\">IMIS&#8217;07 <\/abbr><\/a><\/li>\n<li><abbr title=\"10th Information Security Conference\">ISC&#8217;07 <\/abbr><\/li>\n<li><abbr title=\"2nd workshop on Formal and Computational Cryptography\">FCC&#8217;06<\/abbr>: co-chair with V\u00e9ronique Cortier<\/li>\n<li><a href=\"https:\/\/www.win.tue.nl\/~berry\/wote2006\/\"><abbr title=\"IAVoSS Workshop On Trustworthy Elections\">WOTE&#8217;06 <\/abbr><\/a><\/li>\n<li><abbr title=\"Workshop on Information and Computer Security\">ICS&#8217;06 <\/abbr><\/li>\n<li><abbr title=\"2nd international workshop on Security in Ubiquitous Computing Systems\">SecUbiq&#8217;06 <\/abbr><\/li>\n<li><abbr title=\"4th International Workshop for Applied PKI\">IWAP&#8217;05<\/abbr><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Steering Committees IEEE Computer Security Foundations Symposium (CSF) Conference on Principles of Security and Trust (POST) 2012-2016 European Joint Conferences on Theory and Practice of Software (ETAPS) 2012-2014 Program Committees S&amp;P&#8217;26 Usenix Security&#8217;25 CSF&#8217;24 Usenix Security&#8217;24 PETS&#8217;24 CCS&#8217;23 (track chair) PETS&#8217;23 Usenix Security&#8217;23 ESORICS&#8217;22 E-Vote-ID&#8217;22 MOVEP&#8217;22 Euro S&amp;P&#8217;22 PETS&#8217;22 Indocrypt&#8217;21 ESORICS&#8217;21 E-Vote-ID&#8217;21 Euro S&amp;P&#8217;21 Indocrypt&#8217;20 [&hellip;]<\/p>\n","protected":false},"author":71,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-265","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/pages\/265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/comments?post=265"}],"version-history":[{"count":27,"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/pages\/265\/revisions"}],"predecessor-version":[{"id":484,"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/pages\/265\/revisions\/484"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/media?parent=265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}