This call for papers seeks original contributions that present attacks, analyses, designs, applications, protocols, systems, practical experiences, and theory. Submitted papers may include, but are not limited to, the following topics, all related to passwords and personal authentication:
Best practice reports
Costs and economy
Cryptographic formal attack models
Gestures and graphical patterns
Human factors and behavior
Implementations and tests
Incident and attack reports
Languages, letters and symbols
Management and authorization
We seek submissions for review in the following three categories:
All submission must be done at Easychair website
Accepted papers presented at the workshop will be included in the event proceedings and published by Springer in the Lecture Notes in Computer Science (LNCS) series (formal approval pending.)
Research Papers should describe novel, previously unpublished technical contributions within the scope of the call. The papers will be in-depth reviewed and selected using a double-blind review process by at least three members of the program committee. Paper length is limited to 16 pages (LNCS format) excluding references and well-marked appendices. The paper submitted for review must be anonymous, hence author names, affiliations, acknowledgements, or obvious references must be temporarily edited out for the review process. The submitted paper (PDF or PostScript format) must follow the template described at by Springer LNCS.
Short Papers will also be subject to peer review, where the emphasis will be put on work in progress, hackers’ achievements, industrial experiences, and incidents explained, aiming at novelty and promising directions. Short paper submissions should not be more than 6 pages in standard LNCS format in total. A short paper must be labeled by the subtitle "Short Paper." Accepted short paper submissions may be included in the conference proceedings. Short papers do not need to be anonymous. The program committee may accept full research papers as short papers.
Tutorial proposals are expected to explain new methods, techniques, tools, systems, and services within the Passwords scope. The time frame is one hour. Proposals can be submitted in any format. Publication will be by streaming, video and web.