| |||||||||||||||
SARSSI 2012 : 7th Conference on Network and Information Systems Security | |||||||||||||||
Link: https://sarssi2012.greyc.fr/?lang=en | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
This conference on network and information systems security represents a challenging continuation of the previous conferences SAR (on Security and Network Architecture) and SSI (on Information System Security) which decided to join since 2006. SAR/SSI’2010 is the new annual research conference of the SAR/SSI series. It aims at fostering the presentation of high quality research work in network and system security. The goal of this event is to provide a framework for exchanges among academic researchers, industry, graduate students and a broader audience interested in network and system security. The conference will offer a broad area of events, ranging from panels, tutorials, technical presentations and informal meetings. SAR/SSI will take place in the very nice area of cap-martin, located between Menton and Nice.
Prospective authors are encouraged to submit papers offering novel research contributions in network and system security as well as proposals for tutorials and panels. Submissions can address both theoretical issues in network and system security or provide practical and operational experiences in security management. Languages for papers and presentations can be French or English, both languages being used in SAR/SSI. Topics Authors are invited to submit research papers, papers presenting an experience or industrial applications or tutorials in the following (but not only) topics of interest: Security of new network architectures (e.g. VoIP, MAN/WAN, Gigaethernet), Security in wireless networks, Security in adhoc networks, Security of communications (VPN IPsec, SSL, MPLS, etc.), Security in backbone networks, Security of GIS (Geographic Information Systems) IPv6 security, Intrusion detection, honeypots, Reverse engineering and software protection, Security in peer-to-peer systems, Security in embedded networks, E-commerce security, Formal methods for computer security, Applied cryptography, Authentication, access control, Security protocols, Metrology and security measurement, Worms, Viruses, Botnets, Malware and Spyware, Computer Forensics and Incident Response, Security assessment, Multicast security, Public Key Infrastructures (PKI), trust management, Methodology, ethics, legislation, regulation, Security assessment for information technologies and certification, XML, Web Services and Security, Biometry, watermarking, Anonymity and privacy Security in vehicular communication Important Dates : - December 15th, 2011 : Submission deadline - February 15th, 2012 : Notification - March 1st, 2012: Reduced fare registration - March 15th, 2012: Final version - May 22nd - 25th, 2012: Conference |
|