PASSWORDS 2014 Conference

December 8-10, 2014 – Trondheim, Norway

This call for papers seeks original contributions that present attacks, analyses, designs, applications, protocols, systems, practical experiences, and theory. Submitted papers may include, but are not limited to, the following topics, all related to passwords and personal authentication:

Important dates

Paper submission at

Easychair website


Best practice reports
Costs and economy
Cryptanalytic attacks
Cryptographic formal attack models
Cryptographic protections
Cryptographic protocols
Dictionary attacks
Digital forensics
Gestures and graphical patterns
Guessing attacks
Hash functions
Human factors and behavior
Implementations and tests
Incident and attack reports
Key-stroke dynamics
Languages, letters and symbols
Management and authorization
Markov models

One-time passwords
Passphrase techniques
Password based encryption
Password based key derivation
Password based key exchange
Password protection
Password replacements
Passwords and biometrics
Performance and scalability
Physical traces and smudges
Rainbow tables and trade-offs
Reset and recovery procedures
Side-channel attacks
Single sign-on
Social engineering
Statistical patterns and analyses
Time-memory tradeoffs
Tokens and devices
Usability studies


We seek submissions for review in the following three categories:

  1. Research Papers
  2. Short Papers
  3. Tutorials

All submission must be done at Easychair website

Accepted papers presented at the workshop will be included in the event proceedings and published by Springer in the Lecture Notes in Computer Science (LNCS) series (formal approval pending.)

Research Papers should describe novel, previously unpublished technical contributions within the scope of the call. The papers will be in-depth reviewed and selected using a double-blind review process by at least three members of the program committee. Paper length is limited to 16 pages (LNCS format) excluding references and well-marked appendices. The paper submitted for review must be anonymous, hence author names, affiliations, acknowledgements, or obvious references must be temporarily edited out for the review process. The submitted paper (PDF or PostScript format) must follow the template described at by Springer LNCS.

Short Papers will also be subject to peer review, where the emphasis will be put on work in progress, hackers’ achievements, industrial experiences, and incidents explained, aiming at novelty and promising directions. Short paper submissions should not be more than 6 pages in standard LNCS format in total. A short paper must be labeled by the subtitle "Short Paper." Accepted short paper submissions may be included in the conference proceedings. Short papers do not need to be anonymous. The program committee may accept full research papers as short papers.

Tutorial proposals are expected to explain new methods, techniques, tools, systems, and services within the Passwords scope. The time frame is one hour. Proposals can be submitted in any format. Publication will be by streaming, video and web.