posted by user: Bundesber || 4613 views || tracked by 10 users: [display]

SNDS 2014 : Second International Conference on Security in Computer Networks and Distributed Systems


When Mar 13, 2014 - Mar 14, 2014
Where Thiruvananthapuram (Trivandrum), India
Submission Deadline Nov 10, 2013
Notification Due Dec 15, 2013
Final Version Due Jul 12, 2015
Categories    security   networks   distributed systems

Call For Papers

SNDS invites submissions containing original ideas that are relevant to the scope of the conference. Like other conferences, SNDS requires that papers not be submitted simultaneously to any other conferences or publications; that submissions not be previously published in peer-reviewed conferences; and that accepted papers not be subsequently published elsewhere. Papers describing work that was previously published in a peer-reviewed workshop are allowed, if the authors clearly describe what significant new content has been included.

Authors should submit their papers online. We use EDAS system for submission of papers and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here. The manuscripts should be submitted in PDF format. All submitted papers will be subjected to a "similarity test" by EDAS paper similarity checker. Papers achieving a high similarity score will be examined and those that are deemed unacceptable will be rejected/withdrawn without a formal review.

Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The contents will be included in the CCIS electronic book series hosted in the SpringerLink digital library.

Paper Length: 12 pages maximum

Springer Author Guidelines: PDF

Springer CCIS Manuscript Template: (Word format, LaTeX format)

All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All the accepted papers will be published in the conference proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.

We welcome submissions for SNDS-2014's Technical Program in the following areas and not limited to:
Track 1: Cryptosystems, Algorithms, Primitives

Cryptographic Algorithms, Hash Functions
Cryptographic Primitives and Security Protocols
Digital Signatures
Key Distribution and Management
Analysis of Security Protocols
Privacy, Anonymity and Untraceability
Identity Management
Provable Security
Efficient Implementation

Track 2: Security and Privacy in Networked Systems

P2P, Grid and Cloud
Mobile, Ad Hoc, VANET and Sensor Networks
Social Networks
Satellite Networks
Wireless Networks
Distributed Database Systems
E-Governance and E-commerce
Future Home Networks, Internet of Things, Body-area Networks, Pervasive Services

Track 3: System and Network Security

Secure Operating Systems
Business Continuity & Disaster Recovery Planning
Insider Threats and Countermeasures
Hacking and Defending
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Network Security Policies: Implementation Deployment, Management
High Performance Security Systems
Securing Storage: SAN/NAS Security
Database and System Security
Internet Security & Applications: IPsec, VPNs and Encryption Modes
Web Security, Web Services and Enterprise Security
Access Controls and Security Mechanisms
Attack Data Acquisition and Network Monitoring
Secure Routing, Naming/Addressing, and Network Management
Security in Cellular and Content-delivery Networks
Security in High speed Network
Security in Optical Systems and Networks
Trustworthy Computing for Network Protocols and Distributed Systems
Forensics of Network and Distributed Systems
Public key Infrastructures, Key Management, Certification, and Revocation
Cyber warfare and Physical Security

Track 4: Multimedia Security

Digital Rights Management
Steganography and Digital Watermarking
Intelligent Multimedia Security Services
Image, Audio and Video Encryption Mechanisms
Security of VOIP and multimedia
Privacy and Security in Surveillance Videos
Multimedia Forensics
Visual Event Computation

Track 5: Security Modeling, Experiments, Simulation, and Tools

Security Metrics and Measurements
Security Models and Security Policies
Security Simulation and Tools
Tradeoff Analysis between Performance and Security
Automated Protocols Analysis
Large-scale Attacks and Defense
Implementation and Experimental Testbeds
Vulnerability Analysis

Track 6: Other Security Topics

Trust and Reputation
Security Issues in Software Engineering
Code Obfuscation
Hardware-based Security
Side Channel Attacks
Embedded System Security
Secure Mobile Agents and Mobile Code
Ethical and Legal Implications of Security and Privacy
Language-based Security
Security Standards
Security for Critical Infrastructures
Security in Pervasive/Ubiquitous Computing
Social and Human Implications of Security and Privacy
Active and Adaptive Defense Systems
Security and Privacy in Location-based Services and Complex Systems
Security Through Collaboration
Management of Computing Security
Information Assurance
Reliability and dependability
Policy Based Management for Security, Privacy and Trust

Best Paper Awards

As evaluated by TPC Chairs and TPC Members, THREE papers will be given Best Paper Award for SNDS-2014 viz 1st, 2nd and 3rd respectively. The above committee will expect the presentation of the selected best papers during the conference before finalizing the list. The winners will be declared during the conference.

Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):

International Journal of Trust Management in Computing and Communications (IJTMCC)
ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland

Related Resources

IROS 2017   IEEE/RSJ International Conference on Intelligent Robots and Systems
ICDCS 2017   International Conference on Distributed Computing Systems
ICFNDS 2017   The 2017 International Conference on Future Networks and Distributed Systems (ICFNDS 2017)
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ACISP 2017   Australasian Conference on Information Security and Privacy
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
ICCV 2017   International Conference on Computer Vision
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy