posted by user: icstcfp || 15297 views || tracked by 36 users: [display]

SecureComm 2011 : Seventh International ICST Conference on Security and Privacy in Communication Networks

FacebookTwitterLinkedInGoogle


Conference Series : Security and Privacy in Communication Networks
 
Link: http://www.securecomm.org
 
When Sep 7, 2011 - Sep 9, 2011
Where London, United Kingdom
Submission Deadline May 16, 2011
Notification Due Jun 30, 2011
Final Version Due Jul 22, 2011
Categories    security and privacy   malware and botnets   network intrusion detection   pervasive, ubiquitous computin
 

Call For Papers

***************************************************************************
* *
* CALL FOR PAPERS *
* *
* Seventh International ICST Conference on Security and Privacy in *
* Communication Networks *
* *
* ))) SECURECOMM 2011 ((( *
* London, United Kingdom, September 7-9, 2011 *
* http://www.securecomm.org *
* *
***************************************************************************
Co-Sponsored By:
CreateNet,
City University of London

Organized with the endorsement of the
European Alliance for Innovation (EAI)


***************************************************************************
* PAPER SUBMISSION DEADLINE May 16, 2011 *
***************************************************************************


Securecomm seeks high-quality research contributions in the form of well- developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical
cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Securecomm brings together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers. Securecomm also serves as a venue for learning about state-of-the-art in security and privacy research. Presentations reporting on cutting-edge research results are supplemented by panels on controversial issues and invited talks on timely and important topics.

PAPERS
------
Technical papers describing original unpublished research are solicited.
Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings.


SUBMISSION INSTRUCTIONS:
Paper submission will be handled electronically. Papers must be formatted using Springer LNICST Authors'Kit (http://securecomm.org/authors.shtml)
and submitted only through the Assyst conference management system following the instructions that can be found in the conference web site (Submission Guidelines). Papers must not exceed the limit of 18 pages.
Well-marked appendices of up to 2 pages are allowed but will be read only at the discretion of reviewers. CD proceedings will be distributed during the conference days and will be published by Springer LNICST.

All submitted papers will be judged based on their quality through *double-
blind* reviewing, where the identities of the authors are withheld from the reviewers. Authors' names must not appear in the paper.

PUBLICATIONS:
Accepted papers will be published in the SecureComm Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering (LNICST) series. The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be submitted for inclusion in leading indexing services, including DBLP, Google Scholar, ISI Proceedings, EI, CrossRef and Zentralblatt Math, as well as ICST's own EU Digital Library (EUDL).

TOPICS
------
Topics of interest include, but are not limited to, the following:

* Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc
networks
* Network Intrusion Detection and Prevention, Firewalls, Packet Filters
* Malware and botnets
* Communication Privacy and Anonymity
* Distributed denial of service
* Public Key Infrastructures, key management, credentials
* Web security
* Secure Routing, Naming/Addressing, Network Management
* Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
* Security & Privacy for emerging technologies: VoIP, peer-to-peer and
overlay network systems, Web 2.0

CALL FOR WORKSHOPS AND SPECIAL SESSIONS PROPOSALS:
SecureComm 2011 is seeking original high quality Special Sessions and Workshops on focused discussion addressing innovative research highlighting significant topics and emerging issues which are related to the conference theme and with the desired expertise. Interdisciplinary session themes are strongly sought after. Each special session resembles a mini-conference within the main SecureComm meeting will run throughout the conference in parallel to other tracks (except the keynote presentations). Proposals should be submitted to the Workshop Chair at workshops@securecomm.org by *April 30, 2011*

DEMOS:
Proposals for research and industrial demos are solicited. A maximum of 2 pages should be submitted which include a description of the demo and needed resources from the conference organizers. Proposals should be submitted to the Demo Chair at demos@securecomm.org by *June 27, 2011*.

For any other information please contact the General Chair, Muttukrishnan Rajarajan, City University London, at r.muttukrishnan@city.ac.uk

IMPORTANT DATES
---------------
Paper Submission: May 16, 2011
Notification of Acceptance: June 30, 2011
Camera-ready Version: July 22, 2011
Workshop Proposal: April 30, 2011
Special Sessions Proposal: April 30, 2011
Notification of Acceptance
(Special Sessions and Workshops): May 15, 2011
Demo Proposal: June 27, 2011

STEERING COMMITTEE
* Peng Liu (Chair), Pennsylvania State Univeristy, USA
* Imrich Chlamtac, Create-Net, Italy
* Andreas Schmid, Novalyst, Italy

CONFERENCE ORGANIZING COMMITTEE

General Chair
* Muttukrishnan Rajarajan, City University of London, UK
* Fred Piper, Royal Holloway University of London, UK

Program Co-Chairs
* George Kesidis, Pennsylvania State University, USA
* Haining Wang, College of William and Mary, USA

Workshops Chair
* Morley Mao, University of Michigan, USA

Publicity Chair
* Ali Syed Kalam, NUST, Pakistan

Panels Chair
* Veselin Rakocevic, City University London, UK

Demos and Tutorials Chair
* Dhiren Patel, NIT Surat, India

Sponsorship & Exhibits Chair
* Theo Dimitrakos, BT, UK

Posters Chair
* Divya Bansal, Punjab Engineering College, India

Local Chair
* Steve Furnel, University of Plymouth, UK

Publication Chair
* Ali Sajjad, City University London, UK

Web Chair
* Pramod Pawar, City University London, UK

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICACS 2025   6th lnternational Conference on Advancements in Computational Sciences
SIGCOMM 2025   ACM Special Interest Group on Data Communication
ACC6G 2025   Bali Island, Indonesia -2025 Asia Conference on Communications and 6G (ACC6G 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)