Visible to the public Science of Security VO

The 8th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 31, April 15, 2020. We look forward to receiving your nominations.
COVID-19 Information The safety and well-being of all conference participants is our priority. After evaluating the current COVID-19 situation, the decision has been made to transform the in-person DSN-2020 into an all-digital conference experience. Therefore, the workshops, doctoral forum and tutorials, as well as its...
Professor Munindar Singh was recognized with the 2020 ACM/SIGAI Autonomous Agents Research Award. This award acknowledges the contributions of outstanding researchers in the field of autonomous agents, and is granted each year to one individual whose work is influencing and setting the direction for the field. For more...
The Queens of Code will be presenting four talks about NSA's Computing Women from the 60s, 70s, and 80s as part of the Cyber Center for Education & Innovation (CCEI) series on the NEPRIS platform. These computing pioneers contributed to early technology development and the national defense--a secret they've kept for...
Each quarter, The National Security Agency recognizes the agency's engagement with an academic institution. This quarter, the school is Carnegie Mellon University in Pittsburgh, PA. CMU has many relationships with the NSA including hosting an SoS Lablet. To learn more about the CMU / NSA relationship, visit NSA.gov:...
Subscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our technical community.
The lastest information on all upcoming science of security related events.
Human Factors and Ergonomics Society (HFES) - Call for Papers HFES is looking for submissions of research and practice related to the human and cybersecurity! HFES is interested in building a broad community between human and cyber experts. The HFES society has added a CyberTechnical Group which will be accepting papers...





  • Abstract: A semi-quantum key distribution (SQKD) protocol allows two users A and B to establish a shared secret key that is secure against an all-powerful adversary E even when one of the users (e.g., B) is semi-quantum or classical in nature while the other is fully-quantum. A mediated SQKD protocol allows... more
  • Abstract: We consider information theoretic security in a two-hop combination network where there are groups of end users with distinct degrees of connectivity served by a layer of relays. The model represents a network set up with users having access to asymmetric resources, here the number of relays that... more
  • Abstract: In this work we introduce a novel QKD protocol capable of smoothly transitioning, via a user-tuneable parameter, from classical to semi-quantum in order to help understand the effect of quantum communication resources on secure key distribution. We perform an information theoretic security analysis... more
  • Abstract: We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to correctly decode a message coming from Alice and... more
  • Abstract: It seems impossible to certify that a remote hosting service does not leak its users' data - or does quantum mechanics make it possible? We investigate if a server hosting data can information-theoretically prove its definite deletion using a "BB84-like" protocol. To do so, we first rigorously... more