CMS: Communications and Multimedia Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2015 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
CMS 2014 Communications and Multimedia Security
Sep 25, 2014 - Sep 26, 2014 Aveiro, Portugal Apr 20, 2014
CMS 2013 Communications and Multimedia Security
Sep 25, 2013 - Sep 26, 2013 Magdeburg, Germany Apr 15, 2013
CMS 2012 Communications and Multimedia Security
Sep 3, 2012 - Sep 5, 2012 Canterbury, UK Apr 12, 2012
 
 

Present CFP : 2014

CMS 2014 is the 15th Conference in the "Communications and Multimedia Security" series. The series is a joint effort of the IFIP Technical Committees TC6 (Communication Systems) and TC11 (Security and Privacy Protection in Information Processing Systems).

The conference provides a forum for engineers and scientists in information security. Both state-of-the-art issues and practical experiences as well as new trends in these areas will be once more the focus of interest just like at preceding conferences.

Continuing the last years’ trend, this year the conference will maintain the focus in security and privacy issues in mobile contexts, web services (including social networking) and ubiquitous environments. We solicit papers describing original ideas and research results on topics that include, but are not limited to:

applied cryptography
biometrics
forensics
secure documents and archives
multimedia systems security
digital watermarking
distributed DRM policies
attack resistant rendering engines
adaptive anomaly detection
censorship resistance
risk management
mobility and security/privacy
mobile identities
privacy enhanced identity management
security/privacy policies and preferences
social networks security/privacy
security/privacy in geo-localized applications
security/privacy in VoIP
security policies (including usage control)
web services security
economics of network and information security (NIS)
SOA security
ubiquitous and ambient computing security
cloud computing security/privacy
wireless and ad hoc network security
RFID tags and (multimedia) sensor nodes security
security technology effectiveness
incentivizing security
eID exploitation
e-Government security

Accepted papers will be published by Springer within the LNCS series.

The most outstanding full paper, presented at the conference, will receive a “Best Paper Award”.

The conference will also host a poster session. Posters will be refereed by the PC and will be published in the proceedings as extended abstracts.

Conference Website: www.ieeta.pt/cms2014

Programme Committee:

Anas Abou El Kalam, Cadi Ayyad University, ENSA of Marrakesh, OSCARS Laboratory, Morocco;
Eric Alata, LAAS, France;
Patrick Bas, CNRS - Laboratoire d'Automatique, GénieInformatique et Signal, France;
Jan Camenisch, IBM Research - Zurich, Switzerland;
David Chadwick, University of Kent, United Kingdom;
Howard Chivers, The University of York, United Kingdom;
Isabelle Chrisment, LORIA, TELECOM Nancy - Université de Lorraine, France;
Gabriela Ciocarlie, SRI International, United States;
Dave Clarke, Uppsala Universitet, Sweden;
Frédéric Cuppens, TELECOM Bretagne, France;
Italo Dacosta, KU Leuven, Belgium;
Sabrina De Capitani Di Vimercati, DI - Universita' degli Studi di Milano, Italy;
Lieven De Strycker, KULeuven/KAHO Sint-Lieven, Belgium;
Hervé Debar, Télécom SudParis, France;
Yvo Desmedt, University College London, United Kingdom;
Lieven Desmet, Katholieke Universiteit Leuven, Belgium;
Jana Dittmann, Uni Magdeburg, Germany;
Stelios Dritsas, Athens University of Economic and Business, Greece;
Gerhard Eschelbeck, Sophos, United States;
Simone Fischer-Hübner, Karlstad University, Sweden;
Steven Furnell, Plymouth University, United Kingdom;
Jürgen Fuß, University of Applied Sciences Upper Austria, Hagenberg, Austria;
Sebastien Gambs, IRISA/INRIA - Université de Rennes 1, France;
Dieter Gollmann, Hamburg University of Technology, Germany;
Ruediger Grimm, University of Koblenz, Germany;
Eckehard Hermann, Fachhochschule Hagenberg, Austria;
Jens Hermans, Katholieke Universiteit Leuven - ESAT/SCD - COSIC, Belgium;
Alejandro Hevia, Department of Computer Science, University of Chile, Chile;
Andreas Humm, University of Fribourg, Switzerland;
Christophe Huygens, Katholieke Universiteit Leuven, Belgium;
Sushil Jajodia, George Mason University, United States;
Günter Karjoth, Lucerne University of Applied Sciences & Arts, Switzerland;
Stefan Katzenbeisser, TU Darmstadt, Germany;
Ella Kolkowska, Swedish Business School, Örebro University, Sweden;
Robert Kolmhofer, Secure Information Systems, Austria;
Christian Kraetzer, Dept. of Computer Science, Otto-von-Guericke University Magdeburg, Germany;
Romain Laborde, IRIT/SIERA, France;
Jorn Lapon, KU Leuven, Faculty of Industrial Engineering (Technology Campus Ghent), Belgium;
Herbert Leitold, A-SIT, Austria;
Javier Lopez, University of Malaga, Spain;
Keith Martin, Royal Holloway, University of London, United Kingdom;
Chris Mitchell, Royal Holloway, University of London, United Kingdom;
Yuko Murayama, Iwate Prefectural University, Japan;
Vincent Naessens, Katholieke Hogeschool Sint-Lieven, Belgium;
Eiji Okamoto, University of Tsukuba, Japan;
Chandrasekaran Pandurangan, Indian Institute of Technology, Madras, India;
Günther Pernul, University of Regensburg, Germany;
Alessandro Piva, University of Florence, Italy;
Franz-Stefan Preiss, IBM Research Zurich, Switzerland;
Jean-Jacques Quisquater, UCL DICE/Crypto Group, Belgium;
Kai Rannenberg, Goethe University Frankfurt, Germany;
Carlos Ribeiro, Instituto Superior Técnico, Portugal;
Sergi Robles, Universitat Autònoma de Barcelona, Spain;
Pierangela Samarati, Universita` degli Studi di Milano, Italy;
Riccardo Scandariato, KU Leuven, Belgium;
Ingrid Schaumüller-Bichl, Upper Austrian University of Applied Sciences Campus Hagenberg, Austria;
Joerg Schwenk, Ruhr-Universität Bochum, Germany;
Stefaan Seys, Katholieke Universiteit Leuven, Belgium;
Herman Sikora, GRZ IT Group and Johannes Kepler University of Linz, Austria;
Einar Snekkenes, Gjvik University College, Norway;
Andreas Uhl, University of Salzburg, Austria;
Umut Uludag, TUBITAK-BILGEM-UEKAE, Turkey;
Pedro Veiga, University of Lisbon, Portugal;
Claus Vielhauer, Brancenburg University of Applied Science / Otto-von-Guericke University Magdeburg, Germany;
Tatjana Welzer, University of Maribor, Slovenia;
Andreas Westfeld, HTW Dresden, University of Applied Sciences, Germany;
Ted Wobber, Microsoft Research Silicon Valley, United States;
Shouhuai Xu, University of Texas at San Antonio, United States;
Ge Zhang, Clavister AB & Karlstad University, Sweden;
Gansen Zhao, South China Normal University, China
 

Related Resources

SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
IJCACS 2024   International Journal of Control, Automation, Communication and Systems
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
SAI 2025   14th International Conference on Soft Computing, Artificial Intelligence and Applications
ICICN 2025   2025 IEEE 13th International Conference on Information and Communication Networks (ICICN 2025)