posted by user: NDSS || 28958 views || tracked by 63 users: [display]

NDSS 2013 : 20th Network & Distributed System Security Symposium

FacebookTwitterLinkedInGoogle


Conference Series : Network and Distributed System Security Symposium
 
Link: http://www.internetsociety.org/events/ndss-symposium-2013/ndss-2013-call-papers
 
When Feb 24, 2013 - Feb 27, 2013
Where San Diego, California
Abstract Registration Due Aug 1, 2012
Submission Deadline Aug 6, 2012
Notification Due Oct 22, 2012
Final Version Due Dec 3, 2012
Categories    security   distributed systems   networking
 

Call For Papers

The 20th Annual Network and Distributed System Security (NDSS) Symposium
The Catamaran Resort Hotel and Spa
San Diego, California
24-27 February 2013

Important Dates
Titles and abstracts of papers due: Wednesday, 1 August 2012 (11:59 pm EDT)
Full paper and panel submissions due: Monday, 6 August 2012 (11:59 pm EDT)
Author notification: Monday, 22 October 2012
Final version of papers and panels due: Monday, 3 December 2012

Symposium Goals
The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technologies. The proceedings are published by the Internet Society.

Special emphasis will be made to accept papers in the core theme of network and distributed systems security. Consequently, papers that cover networking protocols and distributed systems algorithms are especially invited to be submitted. Moreover, practical papers in these areas are also very welcome.

What to Submit
Technical papers and panel proposals are solicited. Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. Double-submission will result in immediate rejection. The Programme Committee reserves the right to share information with other conference chairs and journal editors so as to detect such cases.

Technical papers should be written in English. Papers must not exceed 15 pages total (including the references and appendices). Papers must be formatted for US letter (not A4) size paper with margins of at least 0.75 in. on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates found at: http://www.computer.org/portal/web/cscps/formatting.

Reviewing is double blind, and technical papers should thus be properly anonymized to conceal the authors' identities. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed after the acceptance decision is made unless approved by the Programme Committee. Some papers that cannot be accepted as full technical papers may be invited by the Programme Committee to be presented at the conference as short talks. Priority will be given to the papers that have fresh, unconventional ideas.

Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists.

Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.

Submissions are solicited in, but not limited to, the following areas:
* Anti-malware techniques: detection, analysis, and prevention
* Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
* Future Internet architecture and design
* High-availability wired and wireless networks
* Implementation, deployment and management of network security policies
* Integrating security in Internet protocols: routing, naming, network management
* Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
* Intrusion prevention, detection, and response
* Privacy and anonymity technologies
* Public key infrastructures, key management, certification, and revocation
* Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
* Security for collaborative applications: teleconferencing and video-conferencing
* Security for Cloud Computing
* Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, & licensing
* Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
* Security for future home networks, Internet of Things, body-area networks
* Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)
* Security for peer-to-peer and overlay network systems
* Security for Vehicular Ad-hoc Networks (VANETs)
* Security of Web-based applications and services
* Trustworthy Computing mechanisms to secure network protocols and distributed systems

The deadline for full submissions, made electronically in PDF format, is 11:59 pm EDT, 6 August 2012. However, titles and abstracts of papers must be received by 11:59 pm EDT, 1 August 2012. Each submission will be acknowledged by email; if acknowledgement is not received within seven days, contact the Programme Chair. Authors and panelists will be notified of acceptance by 22 October 2012, and given instructions on how to prepare the camera-ready copy.

Submission Site: http://www.easychair.org/conferences/?conf=ndss2013

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
IEA/AIE 2025   The 37th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
MEAP 2024   7th International Conference on Mechanical Engineering & Applications