From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by c5ff346549e7 (Postfix) with ESMTPS id 226371E5 for ; Tue, 5 Feb 2019 10:51:09 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.56,563,1539640800"; d="scan'208,217";a="368047074" Received: from sympa.inria.fr ([193.51.193.213]) by mail2-relais-roc.national.inria.fr with ESMTP; 05 Feb 2019 11:51:05 +0100 Received: by sympa.inria.fr (Postfix, from userid 20132) id 6E68E825B6; Tue, 5 Feb 2019 11:51:05 +0100 (CET) Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id B81A782595 for ; Tue, 5 Feb 2019 11:50:52 +0100 (CET) Authentication-Results: mail3-smtp-sop.national.inria.fr; spf=None smtp.pra=saoussen.cheikhrouhou@redcad.org; spf=SoftFail smtp.mailfrom=saoussen.cheikhrouhou@redcad.org; spf=None smtp.helo=postmaster@mail-yb1-f194.google.com IronPort-PHdr: =?us-ascii?q?9a23=3ADMkE0hxPZ/gRs2PXCy+O+j09IxM/srCxBDY+r6Qd?= =?us-ascii?q?2+MfIJqq85mqBkHD//Il1AaPAd2Lraocw8Pt8InYEVQa5piAtH1QOLdtbDQizf?= =?us-ascii?q?ssogo7HcSeAlf6JvO5JwYzHcBFSUM3tyrjaRsdF8nxfUDdrWOv5jAOBBr/KRB1?= =?us-ascii?q?JuPoEYLOksi7ze+/94HQbglSmDaxfa55IQmrownWqsQYm5ZpJLwryhvOrHtIeu?= =?us-ascii?q?BWyn1tKFmOgRvy5dq+8YB6/ShItP0v68BPUaPhf6QlVrNYFygpM3o05MLwqxbO?= =?us-ascii?q?SxaE62YGXWUXlhpIBBXF7A3/U5zsvCb2qvZx1S+HNsDwULs6Wymt771zRRDniC?= =?us-ascii?q?kJOT03/nzJhMNsl69Uug6tqgZlzoLIfI2YNvxzdb7dc9MAQmpBW95cWTFdD42l?= =?us-ascii?q?YYQBEvcPM+lAoYLguVYArxSwCwqpCu3t1jFGn3H5068j3esvDArL2xcgEMgJsH?= =?us-ascii?q?TJt9X1L7kdUeavwKbUzTXMcfJW2TT96IjSdRAhvPGMXbVtccfK00kgCR7KgUmK?= =?us-ascii?q?poP4JT+V0f4Ns2eC4udmSOmhhWknqwRrrTiuwMchkpPJiZwIxV/Y7yp23Zw5Jd?= =?us-ascii?q?qiSE50edKrDoFftzqaNoRqQsMtWWBouDwgxr0Bo567czAGyI8/xx7FavyHdYeI?= =?us-ascii?q?7Qz5VOqLPDh3mnRoc6+8iRaq6UWs1PHwW82u3FtJridJiMfAum0J2hDJ98SKTv?= =?us-ascii?q?Rw80G80jiVzQ/T8PtLIUUsmKrbNZEhxrkwm4IWsUvZHy/2nFz6ja+NeUk54+So?= =?us-ascii?q?5fnrb7Hpq5OGOI90jQb+MqsqmsOhG+g3Lg8OX22D9eS90r3s41H5Ta1UgvEqlq?= =?us-ascii?q?TVqpPXKMQBqqKnHgNY1pwv5wu7AjqpyNgYmGMILFNBeBKJlYjpPFTOLejjDfil?= =?us-ascii?q?hFSsjSxrx+vYMb3nGJnCMnjDn6ngfbZ+605c0g0zzc1f55JTF7EMO+jzVVHsu9?= =?us-ascii?q?PEFBA2Lha4w+H9CNVyzo8eQ36AAreFMKPOtl+F/v4gLPOJZI8RoTr9L/kl5+Xy?= =?us-ascii?q?jXIigl8cfayp3YMNZ3yiH/RmJV+ZYXv2jdsbH2cKpFl2cOu/g1SHVXtXZm2ud6?= =?us-ascii?q?M6/DAyToy8Sc/IT4WpxbWH2iCmGJZbTmFAEFGFV3nyJKueXPJZUwu1H/RavxpM?= =?us-ascii?q?fpiMaqwB7zaTlCjHg+58J+3J4TYVs9To1NV05O3Jkgwy8iFcFcmR2GiBCWZukT?= =?us-ascii?q?VbFHcNwKljrBklmR+42q9ijqkATI0B17ZySg4/cKXk4al/AtH2VBjGe47TGkyr?= =?us-ascii?q?Tt6vDXc2VN1jmIZSMXY4IM2ri1X45wTvG6UczubZHpE4+avQmX/rKJQlkiuU5O?= =?us-ascii?q?wal1AjB/B3Gyimi6p4rVaBAofIlwCInf/ve/1NgGjC82CMyWfIt0ZdAlZ9?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CjBQDgaVlcdMLbVdFPFh4BHwYHgUwCg?= =?us-ascii?q?mmBAyeDRD+BHZJxhRWVB4EkA1QNI4RJgxMaDAUtBw0BAwEBAgEBAQEBEwEKCww?= =?us-ascii?q?HGwwlDII6IoMBEQYdAQEeCAUNGA03AiEDEgEFASMaE4MIggEPj1WQCjyKKnGBL?= =?us-ascii?q?4J4AQEFhy4IEolngkiBVz+BEYJkgzMOCwMBGIEFG1SCXIJXiXyNIYtVDgcCHII?= =?us-ascii?q?dhH2LCRmCPpAIiiiFMYwhDyGBExkOZYEUfUMxBoI1CYJJgzgzhGGFQEEwAYwsg?= =?us-ascii?q?k0BAQ?= X-IPAS-Result: =?us-ascii?q?A0CjBQDgaVlcdMLbVdFPFh4BHwYHgUwCgmmBAyeDRD+BHZJ?= =?us-ascii?q?xhRWVB4EkA1QNI4RJgxMaDAUtBw0BAwEBAgEBAQEBEwEKCwwHGwwlDII6IoMBE?= =?us-ascii?q?QYdAQEeCAUNGA03AiEDEgEFASMaE4MIggEPj1WQCjyKKnGBL4J4AQEFhy4IEol?= =?us-ascii?q?ngkiBVz+BEYJkgzMOCwMBGIEFG1SCXIJXiXyNIYtVDgcCHIIdhH2LCRmCPpAIi?= =?us-ascii?q?iiFMYwhDyGBExkOZYEUfUMxBoI1CYJJgzgzhGGFQEEwAYwsgk0BAQ?= X-IronPort-AV: E=Sophos;i="5.56,563,1539640800"; d="scan'208,217";a="295137074" Received: from mail-yb1-f194.google.com ([209.85.219.194]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 05 Feb 2019 11:50:50 +0100 Received: by mail-yb1-f194.google.com with SMTP id j189so354254ybj.9 for ; Tue, 05 Feb 2019 02:50:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redcad-org.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=mKxv1V+ndHJOaVisUGVua3xY/u5mkrFnvocI/jODpqw=; b=wL2b6NBRnQCndxpdUkm3JXhrDG3PSNdEbU4NGlZkWfiX99qXK9JTZKAbLUbLfaBN/J t+JUUPVKWsb57HVAkNg6lKN7e2/K3wC2CPh6zRoiz6jdBgnSBgxQQmVciklnPcRQgqlO tf9wLQIxqqAzwHS5B0jmrfboaqdUk2xwcztOHyZe4tlMNfdJ8dbXC3b4tgo5bkibFMMJ IXIbbWRt3q1aLcM9PRSVfcpNaFBz9yNeH7+aJhSffu6VWt3MvYnQkrUjthBgYgnPjbxf +Vykfaih33JPBwtC+ztUOSF5Mo72KlYuEDo4+8dMFs8r2tz/trAGxYeZy7ABRZzcoXVq eKWg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=mKxv1V+ndHJOaVisUGVua3xY/u5mkrFnvocI/jODpqw=; b=GnqSziwyqCTnBNqsCHUrjKjjGmK/HRnDwHLt0L3FUXNQtUu+2v5eR+2TfkoslcNhyK MQXlCen7MGUdce4hFPdgqUceR9glCxHAHGrv3aU5Q/Mm/nWe2cJlpEp3tx4VCzBuafKu S0eHV0wNaR8kIkjkBRp8jVqnhgpgXlIdHWUMeL2yEXLdfnDZqKuM9rmQvPGYdcRXdcou hELks78N34KIRKSjbFG/Is40ZSGNC+7p1AHkHudxXgZI4UwhUMOPil43dZVo+6iM1kNl Yqcc2QpFFQNt4A2PQYQiKBNiZUe8BPQRPUaospVW5h/myiFSPpA7fyj9EOy3rReKGZhc E43g== X-Gm-Message-State: AHQUAua2JKDPMtqM0IowgpEtOnS6+hOkqYTqWfjad52EvoWBnMzdBIYS uvTs/vOzNwS7TUopxejtsDkP7RZcn7KOsa825O2gwg53YyU= X-Google-Smtp-Source: AHgI3Ibw8rn3mF1mA2kJ0e12G1fMJajNhlwvedb+0fd/OrjBgTT04tzn3AA7jI0d7/Txvjo5FK+6wuBO/5x0CdfHlV4= X-Received: by 2002:a25:5cb:: with SMTP id 194mr3362792ybf.432.1549363849301; Tue, 05 Feb 2019 02:50:49 -0800 (PST) MIME-Version: 1.0 From: SAOUSSEN CHEIKHROUHOU Date: Tue, 5 Feb 2019 11:50:15 +0100 Message-ID: To: caml-list@inria.fr, caml-announce@inria.fr Content-Type: multipart/alternative; boundary="000000000000dda5b805812361ef" Subject: [Caml-list] cfp-14th International Conference on Risks and Security of Internet and Systems (CRiSIS) Reply-To: SAOUSSEN CHEIKHROUHOU X-Loop: caml-list@inria.fr X-Sequence: 17330 Errors-to: caml-list-owner@inria.fr Precedence: list Precedence: bulk Sender: caml-list-request@inria.fr X-no-archive: yes List-Id: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: --000000000000dda5b805812361ef Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Call for papers The 14th International Conference on Risks and Security of Internet and Systems (CRiSIS) 29-31 October 2019, Hammamet, Tunisia http://crisis2019.redcad.org The International Conference on Risks and Security of Internet and Systems 2019 will be the 14th in a series dedicated to security issues in Internet-related applications, networks and systems. Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not lack motivation and they are more and more experienced. To make matters worse, for performing attacks have become easily accessible. Moreover, the increasing complexity as well as the immaturity of new technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges. In this context, new security mechanisms and techniques should be deployed to achieve an assurance level acceptable for critical domains such as energy, transportation, health, defence, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers a remarkable forum for computer and network security actors from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them. =3D=3D=3D TOPICS =3D=3D=3D The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to: - Analysis and management of risk - Attacks and defenses - Attack data acquisition and network monitoring - Cryptography, biometrics, watermarking - Dependability and fault tolerance of Internet applications - Distributed systems security and safety - Embedded system security and safety - Empirical methods for security and risk evaluation - Hardware-based security and physical security - Intrusion detection and prevention systems - Organizational, ethical and legal issues - Privacy protection and anonymization - Risk-aware access and usage control - Security and risk assessment - Security and risks metrics - Security and dependability of operating systems - Security and safety of critical infrastructures - Security and privacy of peer-to-peer system - Security and privacy of wireless networks - Security models and security policies - Security of new generation networks, security of VoIP and multimedia - Security of e-commerce, electronic voting and database systems - Security of social networks - Security of industrial control systems - Smartphone security and privacy - Traceability, metrology and forensics - Trust management - Use of smart cards and personal devices for Internet applications - Web and cloud security =3D=3D=3D PAPER SUBMISSION =3D=3D=3D Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must be submitted electronically in PDF format. The papers that will be selected for presentation at the conference will be included in post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (prior to publication the papers should be revised according to the review comments). Pre-proceedings will appear at the time of the conference. Maximum paper length will be 16 printed pages for full papers or 6 pages for short papers, in LNCS style ( http://www.springer.de/comp/lncs/authors.html). Authors of accepted papers must guarantee that their papers will be presented at the conference. All paper submissions will be handled through the Easy Chair conference management system: https://easychair.org/conferences/?conf=3Dcrisis2019 =3D=3D=3D IMPORTANT DATES =3D=3D=3D - Submission deadline: June 09, 2019 - Notification to authors: July 20, 2019 - Camera-ready versions: September 22, 2019 - Conference dates: October 29-31, 2019 =3D=3D=3D GENERAL CHAIRS =3D=3D=3D Nora Cuppens, IMT Atlantique, France Ahmed Hadj Kacem, University of Sfax, Tunisia =3D=3D=3D PC CHAIRS =3D=3D=3D Fr=C3=A9d=C3=A9ric Cuppens, IMT Atlantique, France Slim Kallel, University of Sfax, Tunisia =3D=3D=3D PUBLICATION CHAIRS =3D=3D=3D Nora Cuppens, IMT Atlantique, France Mohamed Mosbah, Bordeaux INP, France =3D=3D=3D PUBLICITY CHAIRS =3D=3D=3D Saoussen Cheikhrouhou, University of Sfax, Tunisia Reda Yaich, IRT SystemX, France =3D=3D=3D LOCAL ORGANISATION COMMITTEE=3D=3D=3D Nesrine Khabou, University of Sfax, Tunisia Fairouz Fakhfekh, University of Sfax, Tunisia Riadh Ben Halima, University of Sfax, Tunisia Ismail Bouassida, University of Sfax, Tunisia Hatem Hadj Kacem, University of Sfax, Tunisia =3D=3D=3D PROGRAM COMMITTEE(to be completed) =3D=3D=3D Esma Aimer, University of Montreal Luca Allodi ,University of Torento Jocelyn Aubert, Luxembourg Institute of Science and Technology Fabrizio Biondi, IRISA/INRIA Rennes Anis Bkakria, IMT Atlantique Yu Chen, State University of New York Binghamton Nora Cuppens-Boulahia,IMT Atlantique, France Fr=C3=A9d=C3=A9ric Cuppens, IMT Atlantique, France Imen Jemili, Facult=C3=A9 des Sciences, Bizerte, Tunisia Jose M. Fernandez, Ecole Polytechnique de Montreal Manoj Singh Gaur, IIT Jammu, India Bogdan Groza, Politehnica University of Timisoara Ruan He, Orange Christos Kalloniatis, University of the Aegean Sokratis Katsikas, Center for Cyber and Information Security, NTNU Nizar Kheir, Thales Group Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRA) Marc Lacoste, Orange Kostas Lambrinoudakis, University of Piraeus Jean-Louis Lanet, LHS Rennes, France Mohamed Mosbah, LaBRI, Bordeaux INP, France Raja Natarajan, TIFR, India Stephen Neville, University of Victoria Roberto Di Pietro, Bell Labs Kai Rannenberg, Goethe University Frankfurt Michael Rusinowitch, LORIA INRIA Nancy Ketil Stoelen, SINTEF Nadia Tawbi, Universit=C3=A9 de Laval Akka Zemmari, LaBRI - Universit=C3=A9 de Bordeaux Lingyu Wang, Concordia University --=20 Caml-list mailing list. Subscription management and archives: https://sympa.inria.fr/sympa/arc/caml-list https://inbox.ocaml.org/caml-list Forum: https://discuss.ocaml.org/ Bug reports: http://caml.inria.fr/bin/caml-bugs= --000000000000dda5b805812361ef Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Call for papers

=
The 14th International Conference on Risks and Security of Internet an= d Systems (CRiSIS)
29-31 October 2019, Hammamet, Tunisia



T= he International Conference on Risks and Security of Internet and Systems 2= 019 will be the 14th in a series dedicated to
security issues in = Internet-related applications, networks and systems. Internet has become es= sential for the exchange of
information between user groups and o= rganizations from different backgrounds and with different needs and object= ives. These
users are exposed to increasing risks regarding secur= ity and privacy, due to the development of more and more sophisticated
online attacks, the growth of Cyber Crime, etc. Attackers nowadays do= not lack motivation and they are more and more
experienced. To m= ake matters worse, for performing attacks have become easily accessible. Mo= reover, the increasing
complexity as well as the immaturity of ne= w technologies such as pervasive, mobile and wireless devices and networks,= raise
new security challenges.


In this context, new security mechanisms and techniques should be de= ployed to achieve an assurance level acceptable for critical
doma= ins such as energy, transportation, health, defence, banking, critical infr= astructures, embedded systems and networks,
avionics systems, etc= . The CRiSIS conference offers a remarkable forum for computer and network = security actors from
industry, academia and government to meet, e= xchange ideas and present recent advances on Internet-related security thre= ats and
vulnerabilities, and on the solutions that are needed to = counter them.


=3D=3D=3D TOPICS =3D= =3D=3D
The topics addressed by CRiSIS range from the analysis of = risks, attacks to networks and system survivability, to security
= models, security mechanisms and privacy enhancing technologies. The authors= are invited to submit research results as well as
practical expe= riment or deployment reports. Industrial papers about applications or case = studies are also welcomed in different
domains (e.g., telemedicin= e, banking, e-government, e-learning, e-commerce, critical infrastructures,= mobile networks,
embedded applications, etc.). The list of topic= s includes but is not limited to:
- Analysis and management of ri= sk
- Attacks and defenses
- Attack data acquisition and= network monitoring
- Cryptography, biometrics, watermarking
- Dependability and fault tolerance of Internet applications
- Distributed systems security and safety
- Embedded system sec= urity and safety
- Empirical methods for security and risk evalua= tion
- Hardware-based security and physical security
- = Intrusion detection and prevention systems
- Organizational, ethi= cal and legal issues
- Privacy protection and anonymization
=
- Risk-aware access and usage control
- Security and risk as= sessment
- Security and risks metrics
- Security and de= pendability of operating systems
- Security and safety of critica= l infrastructures
- Security and privacy of peer-to-peer system
- Security and privacy of wireless networks
- Security m= odels and security policies
- Security of new generation networks= , security of VoIP and multimedia
- Security of e-commerce, elect= ronic voting and database systems
- Security of social networks
- Security of industrial control systems
- Smartphone se= curity and privacy
- Traceability, metrology and forensics
<= div>- Trust management
- Use of smart cards and personal devices = for Internet applications
- Web and cloud security

=

=3D=3D=3D PAPER SUBMISSION =3D=3D=3D=C2=A0
<= div>Submitted papers must not substantially overlap with papers that have b= een published or that are simultaneously submitted to a
journal o= r a conference with proceedings. Papers must be written in English and must= be submitted electronically in PDF format.

The pa= pers that will be selected for presentation at the conference will be inclu= ded in post-proceedings published by Springer in
the Lecture Note= s in Computer Science (LNCS) series (prior to publication the papers should= be revised according to the review
comments). Pre-proceedings wi= ll appear at the time of the conference.=C2=A0

Max= imum paper length will be 16 printed pages for full
papers or 6 p= ages for short papers, in LNCS style (http://www.springer.de/comp/lncs/aut= hors.html). Authors of accepted papers
must guarantee that th= eir papers will be presented at the conference. All paper submissions will = be handled through the Easy
Chair conference management system: <= a href=3D"https://easychair.org/conferences/?conf=3Dcrisis2019" target=3D"_= blank">https://easychair.org/conferences/?conf=3Dcrisis2019
<= br>

=3D=3D=3D IMPORTANT DATES =3D=3D=3D=C2=A0
- Submission deadline: June 09, 2019
- Notification to auth= ors: July 20, 2019
- Camera-ready versions: September 22, 2019
- Conference dates: October 29-31, 2019


=3D=3D=3D GENERAL CHAIRS =3D=3D=3D
No= ra Cuppens, IMT Atlantique, France=C2=A0=C2=A0
Ahmed Hadj Kacem, = University of Sfax, Tunisia


=3D=3D= =3D PC CHAIRS =3D=3D=3D=C2=A0
Fr=C3=A9d=C3=A9ric Cuppens, IMT Atl= antique, France
Slim Kallel, University of Sfax, Tunisia=C2=A0


=3D=3D=3D PUBLICATION CHAIRS =3D=3D= =3D=C2=A0=C2=A0
Nora Cuppens, IMT Atlantique, France
Mo= hamed Mosbah, Bordeaux INP, France


= =3D=3D=3D PUBLICITY CHAIRS =3D=3D=3D=C2=A0=C2=A0
Saoussen Cheikhr= ouhou, University of Sfax, Tunisia
Reda Yaich, IRT SystemX, Franc= e


=3D=3D=3D LOCAL ORGANISATION COMM= ITTEE=3D=3D=3D=C2=A0=C2=A0
Nesrine Khabou, University of Sfax, Tu= nisia=C2=A0
Fairouz Fakhfekh, University of Sfax, Tunisia=C2=A0
Riadh Ben Halima, University of Sfax, Tunisia=C2=A0
Isma= il Bouassida, University of Sfax, Tunisia
Hatem Hadj Kacem, Unive= rsity of Sfax, Tunisia

=3D=3D=3D PROGRAM COMMITTEE= (to be completed) =3D=3D=3D=C2=A0=C2=A0
Esma Aimer, University of= Montreal
Luca Allodi ,University of Torento
Jocelyn Au= bert, Luxembourg Institute of Science and Technology
Fabrizio Bio= ndi, IRISA/INRIA Rennes
Anis Bkakria, IMT Atlantique
Yu= Chen, State University of New York Binghamton
Nora Cuppens-Boula= hia,IMT Atlantique, France=C2=A0
Fr=C3=A9d=C3=A9ric Cuppens, IMT = Atlantique, France
Imen Jemili, Facult=C3=A9 des Sciences, Bizert= e, Tunisia
Jose M. Fernandez, Ecole Polytechnique de Montreal
Manoj Singh Gaur, IIT Jammu, India
Bogdan Groza, Politehni= ca University of Timisoara
Ruan He, Orange
Christos Kal= loniatis, University of the Aegean
Sokratis Katsikas, Center for = Cyber and Information Security, NTNU
Nizar Kheir, Thales Group
Igor Kotenko, St. Petersburg Institute for Informatics and Automati= on of the Russian Academy of Sciences (SPIIRA)
Marc Lacoste, Oran= ge
Kostas Lambrinoudakis, University of Piraeus
Jean-Lo= uis Lanet, LHS Rennes, France
Mohamed Mosbah, LaBRI, Bordeaux INP= , France
Raja Natarajan, TIFR, India
Stephen Neville, U= niversity of Victoria
Roberto Di Pietro, Bell Labs
Kai = Rannenberg, Goethe University Frankfurt
Michael Rusinowitch, LORI= A INRIA Nancy
Ketil Stoelen, SINTEF
Nadia Tawbi, Univer= sit=C3=A9 de Laval
Akka Zemmari, LaBRI - Universit=C3=A9 de Borde= aux=C2=A0
Lingyu Wang, Concordia University
--000000000000dda5b805812361ef--