NDSS 2014 featured optional workshops, SENT and USEC, on Sunday, 23 February 2013. Follow the links below for additional information.

Security of Emerging Networking Technologies (SENT)

Click here to view the Program: SENT Program


Li Erran Li, Bell Labs, Alcatel-Lucent
Adrian Perrig, ETH

With the emergence of new computing paradigms such as mobile computing and cloud computing, communication networks experience unprecedented transformation. The goal of the workshop on Security of Emerging Network Technologies (SENT) is to bring academic and industry researchers together to discuss security problems, challenges, and potential solutions of emerging networking technologies including Software Defined Networks (SDN), cellular networks, Named-Data-Networking (NDN), and future Internet architecture.

The organizers solicited technical papers, including position papers. The following is a non-exhaustive list of topics:

  • Future Internet architecture security and privacy
  • Cellular network security and privacy
  • Software defined networking security and privacy
  • Security of incremental deployment
  • Novel security solutions using SDN

Additional information:

Usable Security (USEC 2014)

Click here to view the Program: USEC Program


Matthew Smith, Leibniz University Hannover
David Wagner, UC Berkeley

Many aspects of information security combine technical and human factors. If a highly secure system is unusable, users will try to circumvent the system or move entirely to less secure but more usable systems. The workshop on Usable Security invites submissions on all aspects of human factors and usability in the context of security and aims to bring together researchers already engaged in this interdisciplinary effort with other computer science researchers in areas such as visualization, artificial intelligence and theoretical computer science as well as researchers from other domains such as economics or psychology.

The organizers solicited original papers describing research or experience in all areas of usable privacy and security. They particularly encouraged collaborative research from authors in multiple fields. Topics included, but were not limited to:

  • Evaluation of usability issues of existing security & privacy models or technology
  • Design and evaluation of new security & privacy models or technology
  • Impact of organizational policy or procurement decisions
  • Lessons learned from designing, deploying, managing or evaluating security & privacy technologies
  • Foundations of usable security & privacy
  • Methodology for usable security & privacy research
  • Ethical, psychological, sociological and economic aspects of security & privacy technologies

Additional information: