diff options
Diffstat (limited to 'updates')
-rw-r--r-- | updates/2002/cfp.en.md | 94 |
1 files changed, 94 insertions, 0 deletions
diff --git a/updates/2002/cfp.en.md b/updates/2002/cfp.en.md new file mode 100644 index 00000000..e1bff8f0 --- /dev/null +++ b/updates/2002/cfp.en.md | |||
@@ -0,0 +1,94 @@ | |||
1 | title: 19C3: Call for Papers | ||
2 | date: 2002-11-09 00:00:00 | ||
3 | updated: 2009-04-18 19:12:41 | ||
4 | author: congress | ||
5 | tags: update | ||
6 | |||
7 | Papers are being solicited for the nineteenth annual Congress of the | ||
8 | Chaos Computer Club e.V., Germany, to be held in Berlin, Germany, from December | ||
9 | 27th through 29th. The congress is intended to promote the technical, | ||
10 | social and political interchange of ideas among hackers, security | ||
11 | professionals, artists, nerds and other lifeforms, watching how technology | ||
12 | affects society. | ||
13 | |||
14 | <!-- TEASER_END --> | ||
15 | |||
16 | Unlike earlier incarnations, this years congress will not only address | ||
17 | the German speaking population. It is our goal to have at least the main | ||
18 | track of the conference held in English and translated to German or held | ||
19 | in German and translated to English. | ||
20 | |||
21 | Topics of interest include, but are not limited to: | ||
22 | |||
23 | - wrecked use of mainstream technology | ||
24 | - obfuscating code, technology and user minds | ||
25 | - IPv6 technology and security, practical experience, 6bone statistics | ||
26 | etc. | ||
27 | - Technical developments and protocols in the Internet (e.g. | ||
28 | Differentiated Services, constraint-based-routing, MPLS, traffic | ||
29 | engineering, policing, COPS, TCPng, streaming protocols, | ||
30 | Peer2Peer-Networks, ENUM etc.) | ||
31 | - telephone networks (wired & wireless, GSM, GPRS, EDGE, UMTS) | ||
32 | - access technology (cable modems, satellite, WLL etc.) | ||
33 | - surveillance technology, LI, state of the art and how to trick it | ||
34 | - security policy and privacy Issues | ||
35 | - security infrastructure, architecture and standards (PKCS, CMA, CDSA | ||
36 | etc.) | ||
37 | - watching them watching us and how to sharpen the picture | ||
38 | - eavesdropping on (streaming) protocols (e.g. internet telephony) | ||
39 | - operating system/platform security (any OS you can think of) | ||
40 | - internet, communications & networking security, including wireless | ||
41 | technologies (WaveLAN, HiperLAN, etc.) | ||
42 | - AAA | ||
43 | - intrusion detection and monitoring | ||
44 | - cryptographic algorithms, technology, toolkits, applications, etc. | ||
45 | (e.g. AES, elliptic curves, PGP, GnuPG etc.) | ||
46 | - smartcards & embedded anything | ||
47 | - biometrics | ||
48 | - copyright, copyleft, copywrong, "interlec-duh-al capital", digital | ||
49 | rights management and the street performer protocol, DMCA vs Freedom | ||
50 | of Speech | ||
51 | - privacy, private data and public data and the difference, if any | ||
52 | - misuse of (multi)media technology, "secure" devices ... | ||
53 | - art & beauty in the global village | ||
54 | - reverse engineering technology how-to's | ||
55 | - circumvention devices & security countermeasures | ||
56 | - political and legislative trends, open and hidden, concerning the | ||
57 | net and communication technology | ||
58 | - crypto-politics in national security | ||
59 | - German issues as TKÜV and equivalents in other countries | ||
60 | - European issues as Cybercrime-Convention and equivalents | ||
61 | - hacker ethics and history | ||
62 | - Developments in Mobile Networking (e.g. Wireless LAN, Ad-Hoc | ||
63 | Networking, Tracking of Persons, etc.) | ||
64 | - activism, hacktivism and other forms of political work | ||
65 | - Organisational structures of NGOs | ||
66 | - Underground Banking | ||
67 | - conspiracy theories | ||
68 | - discordianism | ||
69 | |||
70 | Lectures are expected to be highly relevant in practice or better be | ||
71 | darn funny. Sales droids have been known to disappear without traces on | ||
72 | past events. Interactive Workshops welcome. Hands-On anything even more | ||
73 | welcome. | ||
74 | |||
75 | Intelligent beings wishing to present a paper should submit title and an | ||
76 | one- or two-paragraph abstract (in German or English), references and | ||
77 | URLs, a short biography, and contact information to | ||
78 | [](mailto:congress-crew@ccc.de) RSN, no later than December 1st. | ||
79 | |||
80 | Notice of acceptance will be sent out as soon as possible. Final | ||
81 | presentations should be in English or German and be up to 45 or up to | ||
82 | 100 minutes long, including a question-and-answer period. | ||
83 | |||
84 | As this is a non-profit organisation and non-profit event, the CCC will | ||
85 | not be able to compensate travel or hotel costs let alone a speaker | ||
86 | honorarium, well, maybe travel costs. We are, however, able to arrange | ||
87 | accommodation for low or no cost. | ||
88 | |||
89 | The preliminary agenda will be published on the web [](/congress/2002/) | ||
90 | in the near future. Registration information will be posted, too. | ||
91 | |||
92 | So, do you dare to speak in front of people who might have downloaded | ||
93 | your script from your computer in advance and spotted all the logical | ||
94 | errors? | ||