posted by user: icstcfp || 8201 views || tracked by 37 users: [display]

SecureComm 2011 : Seventh International ICST Conference on Security and Privacy in Communication Networks

FacebookTwitterLinkedInGoogle


Conference Series : Security and Privacy in Communication Networks
 
Link: http://www.securecomm.org
 
When Sep 7, 2011 - Sep 9, 2011
Where London, United Kingdom
Submission Deadline May 16, 2011
Notification Due Jun 30, 2011
Final Version Due Jul 22, 2011
Categories    security and privacy   malware and botnets   network intrusion detection   pervasive, ubiquitous computin
 

Call For Papers

***************************************************************************
* *
* CALL FOR PAPERS *
* *
* Seventh International ICST Conference on Security and Privacy in *
* Communication Networks *
* *
* ))) SECURECOMM 2011 ((( *
* London, United Kingdom, September 7-9, 2011 *
* http://www.securecomm.org *
* *
***************************************************************************
Co-Sponsored By:
CreateNet,
City University of London

Organized with the endorsement of the
European Alliance for Innovation (EAI)


***************************************************************************
* PAPER SUBMISSION DEADLINE May 16, 2011 *
***************************************************************************


Securecomm seeks high-quality research contributions in the form of well- developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical
cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Securecomm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers. Securecomm also serves as a venue for learning about state-of-the-art in security and privacy research. Presentations reporting on cutting-edge research results are supplemented by panels on controversial issues and invited talks on timely and important topics.

PAPERS
------
Technical papers describing original unpublished research are solicited.
Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings.


SUBMISSION INSTRUCTIONS:
Paper submission will be handled electronically. Papers must be formatted using Springer LNICST Authors'Kit (http://securecomm.org/authors.shtml)
and submitted only through the Assyst conference management system following the instructions that can be found in the conference web site (Submission Guidelines). Papers must not exceed the limit of 18 pages.
Well-marked appendices of up to 2 pages are allowed but will be read only at the discretion of reviewers. CD proceedings will be distributed during the conference days and will be published by Springer LNICST.

All submitted papers will be judged based on their quality through *double-
blind* reviewing, where the identities of the authors are withheld from the reviewers. Authors' names must not appear in the paper.

PUBLICATIONS:
Accepted papers will be published in the SecureComm Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering (LNICST) series. The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be submitted for inclusion in leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).

TOPICS
------
Topics of interest include, but are not limited to, the following:

* Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc
networks
* Network Intrusion Detection and Prevention, Firewalls, Packet Filters
* Malware and botnets
* Communication Privacy and Anonymity
* Distributed denial of service
* Public Key Infrastructures, key management, credentials
* Web security
* Secure Routing, Naming/Addressing, Network Management
* Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
* Security & Privacy for emerging technologies: VoIP, peer-to-peer and
overlay network systems, Web 2.0

CALL FOR WORKSHOPS AND SPECIAL SESSIONS PROPOSALS:
SecureComm 2011 is seeking original high quality Special Sessions and Workshops on focused discussion addressing innovative research highlighting significant topics and emerging issues which are related to the conference theme and with the desired expertise. Interdisciplinary session themes are strongly sought after. Each special session resembles a mini-conference within the main SecureComm meeting will run throughout the conference in parallel to other tracks (except the keynote presentations). Proposals should be submitted to the Workshop Chair at workshops@securecomm.org by *April 30, 2011*

DEMOS:
Proposals for research and industrial demos are solicited. A maximum of 2 pages should be submitted which include a description of the demo and needed resources from the conference organizers. Proposals should be submitted to the Demo Chair at demos@securecomm.org by *June 27, 2011*.

For any other information please contact the General Chair, Muttukrishnan Rajarajan, City University London, at r.muttukrishnan@city.ac.uk

IMPORTANT DATES
---------------
Paper Submission: May 16, 2011
Notification of Acceptance: June 30, 2011
Camera-ready Version: July 22, 2011
Workshop Proposal: April 30, 2011
Special Sessions Proposal: April 30, 2011
Notification of Acceptance
(Special Sessions and Workshops): May 15, 2011
Demo Proposal: June 27, 2011

STEERING COMMITTEE
* Peng Liu (Chair), Pennsylvania State Univeristy, USA
* Imrich Chlamtac, Create-Net, Italy
* Andreas Schmid, Novalyst, Italy

CONFERENCE ORGANIZING COMMITTEE

General Chair
* Muttukrishnan Rajarajan, City University of London, UK
* Fred Piper, Royal Holloway University of London, UK

Program Co-Chairs
* George Kesidis, Pennsylvania State University, USA
* Haining Wang, College of William and Mary, USA

Workshops Chair
* Morley Mao, University of Michigan, USA

Publicity Chair
* Ali Syed Kalam, NUST, Pakistan

Panels Chair
* Veselin Rakocevic, City University London, UK

Demos and Tutorials Chair
* Dhiren Patel, NIT Surat, India

Sponsorship & Exhibits Chair
* Theo Dimitrakos, BT, UK

Posters Chair
* Divya Bansal, Punjab Engineering College, India

Local Chair
* Steve Furnel, University of Plymouth, UK

Publication Chair
* Ali Sajjad, City University London, UK

Web Chair
* Pramod Pawar, City University London, UK

Related Resources

ICST 2017   IEEE International Conference on Software Testing, Verification and Validation (ICST) 2017
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ICST 2018   The 11th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2018)
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
CSNDSP 2018   11th IEEE/IET International Symposium on COMMUNICATION SYSTEMS, NETWORKS & DIGITAL SIGNAL PROCESSING
SMDAP_WN 2017   Special Collection on Security Mechanisms and Data Access Protocols in Innovative Wireless Networks - IJDSN (IF: 0.906)
ICCSP - Ei & Scopus 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus