Try the new and let us know what you think!
(Note: Beta site content may not be complete.)

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

SSR 2016: Security Standardisation Research

December 5-6, 2016

Where and When:
SSR 2016, the 3rd International Conference on Research in Security Standardisation, will be hosted by the US National Institute of Standards and Technology (NIST) at the NIST Gaithersburg, MD site, on the 5th and 6th of December 2016.

SSR 2016 will be the third in a series of conferences focusing on the theory, technology and applications of security standards. SSR 2014 was held in the UK in December 2014, and SSR 2015 was held in Japan in December 2015.

Over the last two decades a very wide range of standards have been developed covering a wide range of aspects of cyber security. These documents have been published by national and international formal standardisation bodies, as well as by industry consortia. Many of these standards have become very widely used - to take just one example, the ISO/IEC 27000 series of standards has become the internationally adopted basis for managing corporate information security.

Despite their wide use, there will always be a need to revise existing security standards and to add new standards to cover new domains. The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation. Indeed, many security standards bodies are only beginning to address the issue of transparency, so that the process of selecting security techniques for standardisation can be seen to be as scientific and unbiased as possible.

This conference is intended to cover the full spectrum of research on security standardisation, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST), security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific security standards (e.g. those produced by the payments, telecommunications and computing industries for such things as payment protocols, mobile telephony and trusted computing).

*As was the case for the proceedings of SSR 2014 and SSR 2015, the proceedings of SSR 2016 will be published by Springer in the Lecture Notes in Computer Science series. Proceedings are available free of charge until January 5, 2017 at: