posted by user: zxin || 23329 views || tracked by 58 users: [display]

USENIX Security 2011 : The 20th USENIX Security Symposium

FacebookTwitterLinkedInGoogle

Link: http://www.usenix.org/events/sec11/
 
When Aug 10, 2011 - Aug 12, 2011
Where San Francisco, CA.
Submission Deadline Feb 10, 2011
Notification Due Apr 17, 2011
Final Version Due Jun 7, 2011
Categories    security
 

Call For Papers

Symposium Topics
Refereed paper submissions are solicited in all areas relating to systems
and network security, including:
• Adaptive security and system management
• Analysis of network and security protocols
• Applications of cryptographic techniques
• Attacks against networks and machines
• Authentication and authorization of users, systems, and applications
• Automated tools for source code analysis
• Botnets
• Cryptographic implementation analysis and construction
• Denial-of-service attacks and countermeasures
• File and filesystem security
• Firewall technologies
• Forensics and diagnostics for security
• Hardware security
• Intrusion and anomaly detection and prevention
• Malicious code analysis, anti-virus, anti-spyware
• Network infrastructure security
• Operating system security
• Privacy-preserving (and compromising) systems
• Public key infrastructure
• Rights management and copyright protection
• Security architectures
• Security in heterogeneous and large-scale environments
• Security policy
• Self-protecting and -healing systems
• Techniques for developing secure systems
• Technologies for trustworthy computing
• Usability and security
• Voting systems analysis and security
• Wireless and pervasive/ubiquitous computing security
• Web security, including client-side and server-side security
Note that the USENIX Security Symposium is primarily a systems
security conference. Papers whose contributions are primarily new cryptographic
algorithms or protocols, cryptanalysis, electronic commerce
primitives, etc., may not be appropriate for this conference.
Program committee members are limited to being authors or coauthors
of at most two paper submissions. The program chair is not
permitted to be author or co-author of any paper submissions.

Related Resources

HCAI 2026   Frontiers in Computer Science: Human-Centered AI in Cyber Security, Privacy, and Trust for Critical Infrastructures
CIOS 2026   4th International Conference on Cloud, IoT and Security
GenXSec 2026   1st IEEE International Workshop on Generative and eXplainable AI for Security in Networking
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
CIT 2026   The 24th International Conference on Computer and Information Technology
IJNSA 2026   International Journal of Network Security & Its Applications - ERA Indexed, H Index - 52
AI-EE 2026   2026 International Conference on Artificial Intelligence and Electrical Engineering-EI/Scopus
IEEE TPS 2026   IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
IJSPTM 2026   International Journal of Security, Privacy and Trust Management
IEEE RISC 2026   IEEE Conference on Resilience and Integrated Security for Space and Critical Systems