posted by user: icstcfp || 12664 views || tracked by 36 users: [display]

SecureComm 2011 : Seventh International ICST Conference on Security and Privacy in Communication Networks


Conference Series : Security and Privacy in Communication Networks
When Sep 7, 2011 - Sep 9, 2011
Where London, United Kingdom
Submission Deadline May 16, 2011
Notification Due Jun 30, 2011
Final Version Due Jul 22, 2011
Categories    security and privacy   malware and botnets   network intrusion detection   pervasive, ubiquitous computin

Call For Papers

* *
* *
* Seventh International ICST Conference on Security and Privacy in *
* Communication Networks *
* *
* ))) SECURECOMM 2011 ((( *
* London, United Kingdom, September 7-9, 2011 *
* *
* *
Co-Sponsored By:
City University of London

Organized with the endorsement of the
European Alliance for Innovation (EAI)


Securecomm seeks high-quality research contributions in the form of well- developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical
cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Securecomm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers. Securecomm also serves as a venue for learning about state-of-the-art in security and privacy research. Presentations reporting on cutting-edge research results are supplemented by panels on controversial issues and invited talks on timely and important topics.

Technical papers describing original unpublished research are solicited.
Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings.

Paper submission will be handled electronically. Papers must be formatted using Springer LNICST Authors'Kit (
and submitted only through the Assyst conference management system following the instructions that can be found in the conference web site (Submission Guidelines). Papers must not exceed the limit of 18 pages.
Well-marked appendices of up to 2 pages are allowed but will be read only at the discretion of reviewers. CD proceedings will be distributed during the conference days and will be published by Springer LNICST.

All submitted papers will be judged based on their quality through *double-
blind* reviewing, where the identities of the authors are withheld from the reviewers. Authors' names must not appear in the paper.

Accepted papers will be published in the SecureComm Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering (LNICST) series. The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be submitted for inclusion in leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).

Topics of interest include, but are not limited to, the following:

* Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc
* Network Intrusion Detection and Prevention, Firewalls, Packet Filters
* Malware and botnets
* Communication Privacy and Anonymity
* Distributed denial of service
* Public Key Infrastructures, key management, credentials
* Web security
* Secure Routing, Naming/Addressing, Network Management
* Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
* Security & Privacy for emerging technologies: VoIP, peer-to-peer and
overlay network systems, Web 2.0

SecureComm 2011 is seeking original high quality Special Sessions and Workshops on focused discussion addressing innovative research highlighting significant topics and emerging issues which are related to the conference theme and with the desired expertise. Interdisciplinary session themes are strongly sought after. Each special session resembles a mini-conference within the main SecureComm meeting will run throughout the conference in parallel to other tracks (except the keynote presentations). Proposals should be submitted to the Workshop Chair at by *April 30, 2011*

Proposals for research and industrial demos are solicited. A maximum of 2 pages should be submitted which include a description of the demo and needed resources from the conference organizers. Proposals should be submitted to the Demo Chair at by *June 27, 2011*.

For any other information please contact the General Chair, Muttukrishnan Rajarajan, City University London, at

Paper Submission: May 16, 2011
Notification of Acceptance: June 30, 2011
Camera-ready Version: July 22, 2011
Workshop Proposal: April 30, 2011
Special Sessions Proposal: April 30, 2011
Notification of Acceptance
(Special Sessions and Workshops): May 15, 2011
Demo Proposal: June 27, 2011

* Peng Liu (Chair), Pennsylvania State Univeristy, USA
* Imrich Chlamtac, Create-Net, Italy
* Andreas Schmid, Novalyst, Italy


General Chair
* Muttukrishnan Rajarajan, City University of London, UK
* Fred Piper, Royal Holloway University of London, UK

Program Co-Chairs
* George Kesidis, Pennsylvania State University, USA
* Haining Wang, College of William and Mary, USA

Workshops Chair
* Morley Mao, University of Michigan, USA

Publicity Chair
* Ali Syed Kalam, NUST, Pakistan

Panels Chair
* Veselin Rakocevic, City University London, UK

Demos and Tutorials Chair
* Dhiren Patel, NIT Surat, India

Sponsorship & Exhibits Chair
* Theo Dimitrakos, BT, UK

Posters Chair
* Divya Bansal, Punjab Engineering College, India

Local Chair
* Steve Furnel, University of Plymouth, UK

Publication Chair
* Ali Sajjad, City University London, UK

Web Chair
* Pramod Pawar, City University London, UK

Related Resources

EAI SecureComm 2022   18th EAI International Conference on Security and Privacy in Communication Networks
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
EAI ITSPWC 2022   EAI International Conference on Intelligent Technologies in Security and Privacy for Wireless Communication
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
Sensors (MDPI) SI 2021   Sensors SI on Security, Trust and Privacy in New Computing Environments
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
doors 2022   2nd Edge Computing Workshop co-operated with XIV International Conference on Mathematics, Science and Technology Education (ICon-MaSTEd 2022)
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
AI-enabled security and privacy 2021   AI-enabled security and privacy for Fog Computing and Industrial Internet of Things