posted by user: srgian || 4023 views || tracked by 9 users: [display]

NDSS 2009 : 16th Annual Network and Distributed System Security Symposium


Conference Series : Network and Distributed System Security Symposium
When Feb 8, 2009 - Feb 11, 2009
Where San Diego, CA, USA
Submission Deadline Sep 12, 2008
Notification Due Nov 3, 2008
Final Version Due Dec 12, 2008
Categories    security

Call For Papers

NDSS Symposium 2009
The Catamaran Resort Hotel and Spa
San Diego, CA - 8 - 11 February
16th Annual Network & Distributed System Security Symposium
Call for Papers

Download this page (PDF: 87KB)
Important dates

* Paper and panel submissions due: 11:59 pm PDT, Friday, September 12, 2008.
* Author notification: Monday, November 3, 2008.
* Final version of papers and panels due: Friday, December 12, 2008.

Symposium Goals

The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security services. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology.

The proceedings are published by the Internet Society.
How to submit

Submission instructions are available at
What to Submit

Both technical papers and panel proposals are solicited. Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All papers from authors perpetrating such "double submissions" will be immediately rejected from the symposium. The Program Committee reserves the right to share information with other conference chairs and journal editors so as to detect such cases.

Technical papers should be at most 12 pages excluding the bibliography and well-marked appendices (using 11-point font, single column format, and 1-inch margins on 8.5"x11" or A4 paper), and at most 20 pages total.

The Program Committee members are not required to read the appendices, so the paper should be intelligible without them. Technical papers will appear in the proceedings. Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists.

Submissions are solicited in, but not limited to, the following areas:

* Security of Web-based applications and services.
* Anti-malware techniques: detection, analysis, prevention.
* Intrusion prevention, detection, and response.
* Security for electronic voting.
* Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques.
* Privacy and anonymity technologies.
* Network perimeter controls: firewalls, packet filters, application gateways.
* Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, personal communication systems.
* Security for peer-to-peer and overlay network systems.
* Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing.
* Implementation, deployment and management of network security policies.
* Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management.
* Integrating security services with system and application security facilities and protocols.
* Public key infrastructures, key management, certification, and revocation.
* Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost.
* Security for collaborative applications: teleconferencing and video-conferencing.
* Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
* Security for large-scale systems and critical infrastructures.
* Integrating security in Internet protocols: routing, naming, network management.

Each submission must be accompanied by a separate, electronically submitted Submission Overview specifying the submission type (paper or panel), the title or topic, author names with organizational affiliations, and must specify a contact author along with corresponding phone number, FAX number, postal address and email address.

Submissions must be received by 11:59pm PDT, September 12, 2008, and must be made electronically in PDF format. Each submission will be acknowledged by e-mail; if acknowledgment is not received within seven days, contact the Program Chair. Authors and panelists will be notified of acceptance by November 3, 2008, and given instructions for preparing the camera-ready copy.

Related Resources

ICSRS--Scopus & EI 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
NDSS 2020   Network and Distributed System Security Symposium
ITE 2021   2nd International Conference on Integrating Technology in Education
CISNS-Ei Compendex/Scopus 2020   2020 International Conference on Information System and Network Security
CiVEJ 2020   Civil Engineering and Urban Planning: An International Journal
ICENT--EI Compendex, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
SCOPUS-DMCIT 2021   5th International Conference on Data Mining, Communications and Information Technology (DMCIT 2021)
ATCES--SCOPUS 2021   5th International Conference on Aerospace Technology, Communications and Energy Systems (ATCES 2021)