Call for Papers
Communication & Information Systems Security Symposium 
Symposium Co-Chairs
Yi Qian, University of Nebraska-Lincoln, USA
[email protected]
Yunghsiang Sam Han, National Taiwan University of Science and Technology, Taiwan
[email protected]
Loukas Lazos, University of Arizona, USA
[email protected]
 
Scope and Topics of Interest
With the advent of pervasive computer applications and the proliferation of 
heterogeneous wired and wireless computer and communication networks, security, 
privacy and trust issues have become paramount. This symposium will address all 
aspects of the modeling, design, implementation, deployment, and management of 
security algorithms, protocols, architectures, and systems. Furthermore, 
contributions devoted to the evaluation, optimization, or enhancement of 
security and privacy mechanisms for current technologies, as well as devising 
efficient security and privacy solutions for emerging areas, from 
physical-layer technology to the application layer, are solicited. Topics of 
interest for the Communication and Information Systems Symposium include, but 
are not limited to:
•         Authentication protocols and message authentication
•         Biometric security: technologies, risks, vulnerabilities, 
bio-cryptography, mobile template protection
•         Cloud computing security
•         Computer and network forensics
•         Cryptanalysis
•         DDOS attacks, DNS spoofing, intrusion, localization and 
countermeasures
•         Digital rights management: information hiding, watermarking, 
fingerprinting, and traitor tracing 
•         Formal trust models, security modeling, and protocol design
•         Information systems security and security management
•         Security for mobile and wireless networks
•         Performance metrics for network security metrics 
•         Security and analytical tools for operating systems and applications 
•         Security for optical networks
•         Physical security and hardware/software security
•         Privacy and privacy-enhancing technologies
•         Public-key, symmetric-key, applied crypto, coding-based cryptography
•         Quantum cryptography
•         Security for the smart grid  
•         Virtual private networks
•         Secure multimedia systems (VoIP, IPTV, DAB, etc.) 
•         Tools for analyzing and detecting vulnerability, exploitation, and 
viruses
•         Security for Web, eBusiness, eCommerce, and eGovernment 
 
 
Submission Guidelines
 
Prospective authors are invited to submit original technical papers by the 
deadline of 15 March 2013 for publication in the IEEE Globecom 2013 Conference 
Proceedings and for presentation at the conference.  Submissions will be 
accepted through EDAS. All submissions must be written in English and be at 
most six (6) printed pages in length, including figures.  For full details, 
please visit the following website:
                                                
http://www.ieee-globecom.org/2013/submguide.html
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
[email protected]
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

Reply via email to