posted by user: bhafsa || 1470 views || tracked by 4 users: [display]

JNS 2013 : 3rd Edition of National Days of Security

FacebookTwitterLinkedInGoogle

Link: http://www.ensias.ma/jns3/
 
When Apr 26, 2013 - Apr 27, 2013
Where ENSIAS- Rabat Morocco
Submission Deadline Feb 20, 2013
Notification Due Mar 15, 2013
Final Version Due Mar 23, 2013
 

Call For Papers

After the success of the first two editions of JNS, the Moroccan Society of Digital Trust (Association Marocaine de confiAnace Numérique: AMAN), the initiator of these days, has the pleasure to be associated with ENSIAS represented by ISeRT (Information Security Research Team) to renew the experience and organize on 26 and 27 April 2013, the third edition of the JNS at ENSIAS.

JNS3 will provide a high-level, international forum for scientists, researchers, industrial professionals, and students who will present state-of-the-art research results, address new challenges, and discuss trends in Computational Intelligence, Cybernetics, General Systems Theory, and their applications in diverse fields.

http://www.ensias.ma/jns3/index_en.html

Topics:

This third edition JNS 3 includes four tracks :


Track 1 : Security Policies Formalization & Security and Trust Management
Chair : Khalid EL YASSINI
- Security Policies, Formal methods & verification,
- Digital Identity,
- Access Control Models,
- Trust management systems, Public-Key Infrastructures (PKI), Reputation systems
- Risk Analysis, threats and vulnerabilities
- Métrologie, mesure de la sécurité
- Privacy Protection
- Organizational, juridical and ethical Aspects of Security
- Information Systems Security and Governance
- …

Track 2 : Network and Application Security
Chair : Ahmed BATTAS

- Security of e-commerce, e-government, e-healt, …
- Web Applications Security
- Intrusion Detection, Honeypots, Malware prevention
- Embedded Systems Security , smart cards, ...
- Authentication and biometric Access Control
- Wired , Mobile and Next Generation Networks Security
- …


Track 3 : Cloud Computing and Collaborative Systems Security
Chair : Bouabid EL OUAHIDI

- Cloud Computing Security
- Web Services, midellewares and Security
- Peer to Peer and distributed systems Security
- Social Networks Security and Privacy
- Workflow and Collaborative Systems Security
- …

Track 4 : Cryptology, Watermarking & Steganography
Chair : Said EL HAJJI
- Steganography, Watermarking
- Secret-key & à public-key Cryptography (Encryption, Hash functions, electronic signatures, ..)
- Elliptic Curve Cryptography
- Quantic Cryptography
- Cryptanalysis, security proofs
- Cryptographic Protocols
- …

This topic list is not meant to be exhaustive; so any contribution related to networks and information systems security is welcome. Presentations of practical deployment and implementations of security techniques in new application areas are particularly encouraged.

Submissions from both industry and institutional circles will be considered with particular interest.

Paper Submission and publication

Authors wishing to participate in JNS3 are requested to write an original and high quality paper in English or French according to IEEE double column template.

Papers must be submitted via Easychair (http://www.easychair.org/conferences/?conf=jns3). All submitted papers will be peer-reviewed by at least two reviewers for technical merit, originality and relevance to track topics. Papers must not exceed 6 pages total (including the references and appendices) and must be in Portable Document or Microsoft Word Format (.pdf, .doc).


Conference Proceedings, Special Issues
All accepted papers will be included in the conference proceedings. English versions of accepted and presented papers will be submitted to IEEE for potential publication in the IEEE Xplore. IEEE reserves the right to not publish any proceedings not meeting its quality standards.

A selection of accepted papers will be submitted for publication (as extended versions) in the open access electronic journal e-TI (http://www.revue-eti.net).

Related Resources

IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
ICONSEC 2024   3rd International Conference On Cyber Security and Digital Forensics
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
ICAASE 2024   The 6th Edition of the International Conference on Advanced Aspectsof Software Engineering
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1