CMS: Communications and Multimedia Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2015 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
CMS 2014 Communications and Multimedia Security
Sep 25, 2014 - Sep 26, 2014 Aveiro, Portugal Apr 20, 2014
CMS 2013 Communications and Multimedia Security
Sep 25, 2013 - Sep 26, 2013 Magdeburg, Germany Apr 15, 2013
CMS 2012 Communications and Multimedia Security
Sep 3, 2012 - Sep 5, 2012 Canterbury, UK Apr 12, 2012
CMS 2011 12th Conference in the Communications and Multimedia Security
Oct 19, 2001 - Oct 21, 2001 Ghent, Belgium Mar 18, 2011
 
 

Present CFP : 2014

CMS 2014 is the 15th Conference in the "Communications and Multimedia Security" series. The series is a joint effort of the IFIP Technical Committees TC6 (Communication Systems) and TC11 (Security and Privacy Protection in Information Processing Systems).

The conference provides a forum for engineers and scientists in information security. Both state-of-the-art issues and practical experiences as well as new trends in these areas will be once more the focus of interest just like at preceding conferences.

Continuing the last years’ trend, this year the conference will maintain the focus in security and privacy issues in mobile contexts, web services (including social networking) and ubiquitous environments. We solicit papers describing original ideas and research results on topics that include, but are not limited to:

applied cryptography
biometrics
forensics
secure documents and archives
multimedia systems security
digital watermarking
distributed DRM policies
attack resistant rendering engines
adaptive anomaly detection
censorship resistance
risk management
mobility and security/privacy
mobile identities
privacy enhanced identity management
security/privacy policies and preferences
social networks security/privacy
security/privacy in geo-localized applications
security/privacy in VoIP
security policies (including usage control)
web services security
economics of network and information security (NIS)
SOA security
ubiquitous and ambient computing security
cloud computing security/privacy
wireless and ad hoc network security
RFID tags and (multimedia) sensor nodes security
security technology effectiveness
incentivizing security
eID exploitation
e-Government security

Accepted papers will be published by Springer within the LNCS series.

The most outstanding full paper, presented at the conference, will receive a “Best Paper Award”.

The conference will also host a poster session. Posters will be refereed by the PC and will be published in the proceedings as extended abstracts.

Conference Website: www.ieeta.pt/cms2014

Programme Committee:

Anas Abou El Kalam, Cadi Ayyad University, ENSA of Marrakesh, OSCARS Laboratory, Morocco;
Eric Alata, LAAS, France;
Patrick Bas, CNRS - Laboratoire d'Automatique, GénieInformatique et Signal, France;
Jan Camenisch, IBM Research - Zurich, Switzerland;
David Chadwick, University of Kent, United Kingdom;
Howard Chivers, The University of York, United Kingdom;
Isabelle Chrisment, LORIA, TELECOM Nancy - Université de Lorraine, France;
Gabriela Ciocarlie, SRI International, United States;
Dave Clarke, Uppsala Universitet, Sweden;
Frédéric Cuppens, TELECOM Bretagne, France;
Italo Dacosta, KU Leuven, Belgium;
Sabrina De Capitani Di Vimercati, DI - Universita' degli Studi di Milano, Italy;
Lieven De Strycker, KULeuven/KAHO Sint-Lieven, Belgium;
Hervé Debar, Télécom SudParis, France;
Yvo Desmedt, University College London, United Kingdom;
Lieven Desmet, Katholieke Universiteit Leuven, Belgium;
Jana Dittmann, Uni Magdeburg, Germany;
Stelios Dritsas, Athens University of Economic and Business, Greece;
Gerhard Eschelbeck, Sophos, United States;
Simone Fischer-Hübner, Karlstad University, Sweden;
Steven Furnell, Plymouth University, United Kingdom;
Jürgen Fuß, University of Applied Sciences Upper Austria, Hagenberg, Austria;
Sebastien Gambs, IRISA/INRIA - Université de Rennes 1, France;
Dieter Gollmann, Hamburg University of Technology, Germany;
Ruediger Grimm, University of Koblenz, Germany;
Eckehard Hermann, Fachhochschule Hagenberg, Austria;
Jens Hermans, Katholieke Universiteit Leuven - ESAT/SCD - COSIC, Belgium;
Alejandro Hevia, Department of Computer Science, University of Chile, Chile;
Andreas Humm, University of Fribourg, Switzerland;
Christophe Huygens, Katholieke Universiteit Leuven, Belgium;
Sushil Jajodia, George Mason University, United States;
Günter Karjoth, Lucerne University of Applied Sciences & Arts, Switzerland;
Stefan Katzenbeisser, TU Darmstadt, Germany;
Ella Kolkowska, Swedish Business School, Örebro University, Sweden;
Robert Kolmhofer, Secure Information Systems, Austria;
Christian Kraetzer, Dept. of Computer Science, Otto-von-Guericke University Magdeburg, Germany;
Romain Laborde, IRIT/SIERA, France;
Jorn Lapon, KU Leuven, Faculty of Industrial Engineering (Technology Campus Ghent), Belgium;
Herbert Leitold, A-SIT, Austria;
Javier Lopez, University of Malaga, Spain;
Keith Martin, Royal Holloway, University of London, United Kingdom;
Chris Mitchell, Royal Holloway, University of London, United Kingdom;
Yuko Murayama, Iwate Prefectural University, Japan;
Vincent Naessens, Katholieke Hogeschool Sint-Lieven, Belgium;
Eiji Okamoto, University of Tsukuba, Japan;
Chandrasekaran Pandurangan, Indian Institute of Technology, Madras, India;
Günther Pernul, University of Regensburg, Germany;
Alessandro Piva, University of Florence, Italy;
Franz-Stefan Preiss, IBM Research Zurich, Switzerland;
Jean-Jacques Quisquater, UCL DICE/Crypto Group, Belgium;
Kai Rannenberg, Goethe University Frankfurt, Germany;
Carlos Ribeiro, Instituto Superior Técnico, Portugal;
Sergi Robles, Universitat Autònoma de Barcelona, Spain;
Pierangela Samarati, Universita` degli Studi di Milano, Italy;
Riccardo Scandariato, KU Leuven, Belgium;
Ingrid Schaumüller-Bichl, Upper Austrian University of Applied Sciences Campus Hagenberg, Austria;
Joerg Schwenk, Ruhr-Universität Bochum, Germany;
Stefaan Seys, Katholieke Universiteit Leuven, Belgium;
Herman Sikora, GRZ IT Group and Johannes Kepler University of Linz, Austria;
Einar Snekkenes, Gjvik University College, Norway;
Andreas Uhl, University of Salzburg, Austria;
Umut Uludag, TUBITAK-BILGEM-UEKAE, Turkey;
Pedro Veiga, University of Lisbon, Portugal;
Claus Vielhauer, Brancenburg University of Applied Science / Otto-von-Guericke University Magdeburg, Germany;
Tatjana Welzer, University of Maribor, Slovenia;
Andreas Westfeld, HTW Dresden, University of Applied Sciences, Germany;
Ted Wobber, Microsoft Research Silicon Valley, United States;
Shouhuai Xu, University of Texas at San Antonio, United States;
Ge Zhang, Clavister AB & Karlstad University, Sweden;
Gansen Zhao, South China Normal University, China
 

Related Resources

IEEE TSC (CMS) 2016   IEEE Transactions on Services Computing: Special Issue on Software Engineering and Applications for Cloud-based Mobile Systems
ICMR 2017   ACM International Conference on Multimedia Retrieval
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
ACISP 2017   Australasian Conference on Information Security and Privacy
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
IEEE WoWMoM 2017   18th International Symposium on a World of Wireless, Mobile and Multimedia Networks
IJNGN 2016   International Journal of Next-Generation Networks
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ICFCC 2017   2017 9th International Conference on Future Computer and Communication (ICFCC 2017) - Ei & Scopus
ICMBN 2017   2017 International Conference on Multimedia, Broadcasting and Network (ICMBN 2017)--Ei, Scopus