posted by user: NDSS || 38556 views || tracked by 72 users: [display]

NDSS 2012 : 19th Network & Distributed System Security Symposium

FacebookTwitterLinkedInGoogle


Conference Series : Network and Distributed System Security Symposium
 
Link: http://www.isoc.org/isoc/conferences/ndss/12/cfp.shtml
 
When Feb 5, 2012 - Feb 8, 2012
Where San Diego, California
Abstract Registration Due Aug 16, 2011
Submission Deadline Aug 23, 2011
Notification Due Oct 23, 2011
Final Version Due Dec 2, 2011
Categories    security   distributed systems   networking
 

Call For Papers

NDSS '12
Hilton San Diego Resort & Spa
San Diego, California
February 5-8, 2012

REVISED Dates
* Titles and abstracts of papers due: Tuesday, August 16, 2011 (11:59 pm ET)
* Full paper and panel submissions due: Tuesday, August 23, 2011 (11:59 pm ET)
* Author notification: Sunday, October 23, 2011
* Final version of papers and panels due: Friday, December 2, 2011

Symposium Goals
The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society (ISOC).

Submissions
Technical full and *short* papers and panel proposals are solicited. Technical papers must not substantially overlap with material published at or simultaneously submitted to a venue with proceedings. Double-submission will result in immediate rejection. Reviewing of technical papers is double-blind, and they should be properly anonymized to conceal the authors' identity. *All* technical papers should be at most 15 pages (11-point font, single column, 1-inch margins, US letter or A4) excluding the bibliography and well-marked appendices, and at most 20 pages total. Papers accepted as short will be limited to 10 pages total (8 + 2 bibliography) in the proceedings. Papers should be intelligible without appendices. Panel proposals should be one page and must identify the panel chair, explain the topic and format, and list potential panelists. A panel description will appear in the proceedings, and may include written position statements from panelists.

Clarification: All paper flavors (long or short) are reviewed in one batch. The PC decides whether the paper is more suitable as long or short. If authors decide to submit short to start with, then it goes in as short if accepted.

Overall, we are looking not only for solid results but also for crazy out of the box ideas. Areas of interest include (but are not limited to):

Network perimeter controls: firewalls, packet filters, application gateways
Network protocol security: routing, naming, network management
Cloud computing security
Security issues in Future Internet architecture and design
Security of web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Secure future home networks, Internet of Things, body-area networks
Intrusion prevention, detection, and response
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Security for wireless, mobile networks
Security of personal communication systems
Vehicular Ad-hoc Network (VANETs) Security
Security of peer-to-peer and overlay network systems
Electronic commerce security: e.g., payments, notarization, timestamping.
Network security policies: implementation deployment, management
Intellectual property protection: protocols, implementations, DRM
Public key infrastructures, key management, certification, and revocation
Security for Emerging Technologies
Special problems and case studies: cost, usability, security vs. efficiency
Collaborative applications: teleconferencing and video-conferencing
Smart Grid Security
Secure Electronic Voting
Security of large-scale critical infrastructures
Trustworthy Computing for network protocols and distributed systems
Network and distributed systems forensics

NDSS ‘12 will feature several best paper awards.

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
IEA/AIE 2025   The 37th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
MEAP 2024   7th International Conference on Mechanical Engineering & Applications