首页
社区
课程
招聘
[分享][ICC'11 CISS] IEEE ICC 2011 call for papers in the area of CIS
发表于: 2010-8-13 23:50 15455

[分享][ICC'11 CISS] IEEE ICC 2011 call for papers in the area of CIS

2010-8-13 23:50
15455
IEEE ICC 2011
      Communication and Information Systems Security (CISS) Symposium
                       June 5.-9. 2011, Kyoto, Japan

                       http://www.ieee-icc.org/2011/

                              CALL FOR PAPERS

Scope and Motivation
--------------------
With the advent of pervasive computer applications and due to the proliferation
of heterogeneous wired and wireless computer and communication networks,
security, privacy and trust issues have become paramount. This Symposium will
address all aspects of the modeling, design, implementation, deployment, and
management of security algorithms, protocols, architectures, and systems.
Furthermore, contributions devoted to the evaluation, optimization, or
enhancement of security and privacy mechanisms for current technologies, as
well as devising efficient security and privacy solutions for emerging areas
from physical layer technology to the application layer, are solicited.

Main Topics of Interest
-----------------------
Topics of interest include, but are not limited to, the following:
- Authentication protocols and message authentication
- Biometric security: technologies, risks, vulnerabilities, bio-cryptography,
mobile template protection
- Computer and network forensics
- Cryptanalysis
- DDOS attacks, DNS spoofing, intrusion, localization and countermeasures
- Digital right management: information hiding, watermarking, fingerprinting,
and traitor tracing scheme
- Formal trust models, security modeling and protocol design
- Information systems security and security management
- Mobile and Wireless network security, including ad hoc networks,
P2P networks, 3G, 4G, sensor networks, Bluetooth, 802.11 family and WiMAX
- Network security metrics and performance
- Operating systems and application security and analysis tools
- Optical network security
- Physical security and hardware/software security
- Privacy and privacy enhancing technologies
- Public-key, symmetric-key, applied crypto, coding-based cryptography
- Quantum cryptography
- Virtual private networks and group security
- VoIP, IPTV, DAB, and other multimedia security
- Vulnerability, exploitation tools and virus analysis
- Web, Cloud, eBusiness, eCommerce, eGovernment security

Sponsoring Technical Committees
-------------------------------
IEEE ComSoc Communications and Information Security (CIS-TC)
See: http://committees.comsoc.org/cistc/

Important Dates
---------------
Manuscript submission deadline:  7. Sep. 2010
Notification of decision:       11. Jan. 2011
Camera-ready deadline:          11. Feb. 2011

Instructions for Authors
------------------------
Papers must represent high-quality and previously unpublished work. Original
research papers are solicited in all areas of communication and information
systems security. All submissions will be handled electronically through the
EDAS conference management system at www.edas.info and must be in pdf format,
with a maximum length of six pages. A formatting template may be found at
http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html.

IEEE ICC 2011 CISS Symposium co-Chairs
--------------------------------------
Peter Muller, IBM Zurich Research Laboratory, Switzerland (pmu@zurich.ibm.com)
Xiaodong Lin, University of Ontario, Canada (xiaodong.lin@uoit.ca)
Seong Han Shin, Natl. Inst. of AIST, Japan (seonghan.shin@aist.go.jp)

[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

收藏
免费 0
支持
分享
最新回复 (1)
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
2
*******************************************************************************
                               IEEE ICC 2011
      Communication and Information Systems Security (CISS) Symposium
                       June 5.-9. 2011, Kyoto, Japan

                       http://www.ieee-icc.org/2011/

                              CALL FOR PAPERS

Scope and Motivation
--------------------
With the advent of pervasive computer applications and due to the proliferation
of heterogeneous wired and wireless computer and communication networks,
security, privacy and trust issues have become paramount. This Symposium will
address all aspects of the modeling, design, implementation, deployment, and
management of security algorithms, protocols, architectures, and systems.
Furthermore, contributions devoted to the evaluation, optimization, or
enhancement of security and privacy mechanisms for current technologies, as
well as devising efficient security and privacy solutions for emerging areas
from physical layer technology to the application layer, are solicited.

Main Topics of Interest
-----------------------
Topics of interest include, but are not limited to, the following:
- Authentication protocols and message authentication
- Biometric security: technologies, risks, vulnerabilities, bio-cryptography,
mobile template protection
- Computer and network forensics
- Cryptanalysis
- DDOS attacks, DNS spoofing, intrusion, localization and countermeasures
- Digital right management: information hiding, watermarking, fingerprinting,
and traitor tracing scheme
- Formal trust models, security modeling and protocol design
- Information systems security and security management
- Mobile and Wireless network security, including ad hoc networks,
P2P networks, 3G, 4G, sensor networks, Bluetooth, 802.11 family and WiMAX
- Network security metrics and performance
- Operating systems and application security and analysis tools
- Optical network security
- Physical security and hardware/software security
- Privacy and privacy enhancing technologies
- Public-key, symmetric-key, applied crypto, coding-based cryptography
- Quantum cryptography
- Virtual private networks and group security
- VoIP, IPTV, DAB, and other multimedia security
- Vulnerability, exploitation tools and virus analysis
- Web, Cloud, eBusiness, eCommerce, eGovernment security

Sponsoring Technical Committees
-------------------------------
IEEE ComSoc Communications and Information Security (CIS-TC)
See: http://committees.comsoc.org/cistc/

Important Dates
---------------
Manuscript submission deadline: 20. Sep. 2010
Notification of decision:       11. Jan. 2011
Camera-ready deadline:          11. Feb. 2011

Instructions for Authors
------------------------
Papers must represent high-quality and previously unpublished work. Original
research papers are solicited in all areas of communication and information
systems security. All submissions will be handled electronically through the
EDAS conference management system at
http://www.edas.info/newPaper.php?c=8816&track=9492
and must be in pdf format, with a maximum length of six pages. A formatting
template may be found at
http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html.

IEEE ICC 2011 CISS Symposium co-Chairs
--------------------------------------
Peter Muller, IBM Zurich Research Laboratory, Switzerland (pmu@zurich.ibm.com)
Xiaodong Lin, University of Ontario, Canada (xiaodong.lin@uoit.ca)
Seong Han Shin, Natl. Inst. of AIST, Japan (seonghan.shin@aist.go.jp)

*******************************************************************************
2010-9-11 06:17
0
游客
登录 | 注册 方可回帖
返回
//