8th ESORICS in 2003

ESORICS 2003

Miscellaneous

Go back to main home page, last updated December 2003.
Import the file containing the references of all articles of these proceedings (in REFER format).

Proceedings :
Computer Security - ESORICS 2003
8th European Symposium on Research in Computer Security
Gjøvik, Norway, October 2003
Dieter Gollmann, Einar Snekkenes (Eds.)
Lecture Notes in Computer Science, No 2808
Springer-Verlag
350 pages, ISBN 3-540-20300-1
LNCS 2808

Preface

ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer se- curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together re- searchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas.

ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually.

ESORICS 2003 was organized by Gjøvik University College, and took place in Gjøvik, Norway, October 13­15, 2003.

The program committee received 114 submissions, originating from 26 coun- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The final selec- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000 and 2002 received 75 and 83 papers and accepted 19% and 16%, respectively.

The program reflected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security mod- els, authentication, and intrusion detection.

The program committee gratefully acknowledges all authors who submitted papers for their efforts in maintaining the standards of this conference.

It is also my pleasure to thank the members of the program committee, the additional reviewers, and the members of the organization committee for their work and support.

Einar Snekkenes
Gjøvik, October 2003


Contents of the Proceedings