posted by user: bartdedecker || 9414 views || tracked by 13 users: [display]

CMS 2013 : Communications and Multimedia Security

FacebookTwitterLinkedInGoogle


Conference Series : Communications and Multimedia Security
 
Link: http://www.cms2013.de/
 
When Sep 25, 2013 - Sep 26, 2013
Where Magdeburg, Germany
Submission Deadline Apr 15, 2013
Notification Due Jun 3, 2013
Final Version Due Jun 18, 2013
Categories    security   privacy   multimedia   biometrics
 

Call For Papers

Call For Papers

C M S 2 0 1 3

14th Conference in the "Communications and Multimedia Security"

September 25-26, 2013, Magdeburg, Germany

http://www.cms2013.de


--------------------------------------------------------------------------

Important Deadlines
-------------------
Paper/poster submission: 15th of April 2013
Acceptance notification: 3rd of June 2013
Camera-ready papers due: 18th of June 2013
Conference: 25th and 26th of Sep 2013


Enclosed you'll find the Call-for-papers for CMS'2013.

We look forward to your participation. The submission deadline
is 15th of April 2013.

Could you also forward this CfP to appropriate researchers?

Thank you and best regards,

Jana Dittmann
Claus Vielhauer
Bart De Decker
co-chairs CMS'2013
----------------------------------------------------------------------------

14th Joint IFIP TC6 and TC11 Conference on
Communications and Multimedia Security -- CMS'2013
September 25-26, 2013, Magdeburg, Germany

CMS'2013 is the 14th Conference in the “Communications and Multimedia
Security" series. The series is a joint effort of IFIP Technical
Committees TC6 (Communication Systems) and TC11 (Security and Protection
in Information Processing Systems). The conference provides a forum for
engineers and scientists in information security. Both state-of-the-art
issues and practical experiences as well as new trends in these areas
will be once more the focus of interest just like at preceding
conferences. The conference will address in particular security and
privacy issues in mobile contexts, web services (including social
networking) and ubiquitous environments.

We solicit papers describing original ideas and research results on
topics that include, but are not limited to: applied cryptography,
biometrics, forensics, secure documents and archives, multimedia systems
security, digital watermarking, distributed DRM policies, attack
resistant rndering engines, adaptive anomaly detection, censorship
resistance, risk management, mobility and security/privacy, mobile
identities, privacy enhanced identity management, security/privacy
policies and preferences, social networks security/privacy,
security/privacy in geo-localized applications, security/privacy in
VoIP`, security policies (including usage control), web services
security, economics of network and information security (NIS), SOA
security, ubiquitous and ambient computing security, cloud computing
security/privacy, wireless and ad hoc network security, RFID tags and
(multimedia) sensor nodes security, security technology effectiveness,
incentivizing security

The proceedings will be published by Springer. To submit a paper or a
poster, visit the conference web site at www.cms2013.de

Important dates:
Paper/poster submission: 15th of April 2013
Acceptance notification: 3rd of June 2013
Camera-ready papers due: 18th of June 2013

Conference Chair: Bart De Decker, KU Leuven, Belgium

Organizing Committee Chair: Jana Dittmann, Otto-von-Guericke University
Magdeburg, Germany

Program Committee Chair: Claus Vielhauer, Brandenburg University of
Applied Sciences, Germany

Proceedings Chair: Christian Krätzer
Local Proceedings Committee: Tobias Scheidat, Eric Clausing

Local Technical Organizing Chair: Stefan Kiltz
Local Technical Organization Committee: Silke Reifgerste, Christian
Arndt, Jennifer Sturm

Instructions for authors:

The conference will comprise two refereed paper tracks: the Research
track and the Industry/Government/Work-in-progress track, as well as a
poster session, all of them being presented in a single stream.

Paper submissions for the Research track must be written in English,
formatted in the conference style (limited to 14 pages, see the
conference web site for a style template and submission instructions).
The paper must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references. Authors are requested to submit
original papers only. Papers that have previously been published and
papers that are currently being considered for publication by another
journal or conference are not eligible.
Each paper must include a short abstract and a list of keywords
indicating subject classification. Its introduction should summarize the
contributions of the paper at a level appropriate for a non-specialist
reader.

Paper submissions for the Industry/Government/Work-in-progress track are
limited to 8 pages (see also conference website for the instructions).
These papers highlight applications or present work-in-progress. They
should also address challenges, lessons learned or research issues
arising out of –both successful and unsuccessful- deployment of such
applications. Note, however, that sufficient technical content is required.

For Poster submissions, a title and an abstract (max 2 pages) is
required. Accepted posters will be published in the proceedings as
extended abstracts.

Special Session are planned to be organized for Biometrics and
Forensics. All paper will go through the normal paper review.

All submitted papers will be refereed by members of the Programme
Committee for correctness, originality, relevance to the conference and
quality of presentation. Acceptance of a paper or poster means an
obligation for at least one of the authors to attend the conference and
present the paper or poster.

The most outstanding research paper, presented at the conference, will
receive a "Best paper award".

Conference Website: www.cms2013.de

Programme Committee:

Anas Abou El Kalam, UCA-ENSA, Marrakesh, Morocco; Eric Alata, LAAS-CNRS,
France; Patrick Bas, CNRS - Laboratoire d'Automatique, GénieInformatique
et Signal, France; David W. Chadwick, University of Kent, UK; Howard
Chivers, The University Of York, UK; Isabelle Chrisment,
LORIA-University of Nancy, France; Gabriela Ciocarlie, Computer Science
Lab, SRI International, USA; Frédéric Cuppens, Télécom Bretagne, France;
Italo Dacosta, KU Leuven, Belgium; Sabrina De Capitani di Vimercati,
Università degli Studi di Milano, Italy; Bart De Decker, KU Leuven,
Belgium; Lieven De Strycker, Katholieke Hogeschool Sint-Lieven, Belgium;
Hervé Debar, Télécom SudParis, France; Yvo Desmedt, University of Texas
at Dallas, USA and UniversityCollege London, UK; Jana Dittmann,
University of Magdeburg, Germany; Stelios Dritsas, Athens University of
Economics and Business, Greece; Gerhard Eschelbeck, Sophos, USA; Simone
Fischer-Huebner, Karlstad University, Sweden; Teddy Furon, INRIA Rennes
- Bretagne Atlantique, France; Jürgen Fuß, University of Applied
Sciences Upper Austria,Hagenberg, Austria; Sebastien Gambs, Université
de Rennes 1 - INRIA / IRISA, France; Christian Geuer-Pollmann, Microsoft
Research, Germany; Dieter Gollmann, Hamburg University of Technology,
Germany; Jean Hennebert, University of Applied Sciences, HES-SO,
Switzerland; Eckehard Hermann, University of Applied Sciences Upper
Austria,Hagenberg, Austria; Jens Hermans, KU Leuven, Belgium; Andreas
Humm, University of Fribourg, Switzerland; Edward Humphreys, XiSEC, UK;
Christophe Huygens, KU Leuven, Belgium; Witold Jacak, University of
Applied Sciences Upper Austria,Hagenberg, Austria; Sushil Jajodia,
George Mason University, USA; Guenter Karjoth, IBM Research - Zurich,
Switzerland; Stefan Katzenbeisser, TU Darmstadt, Germany; Markulf
Kohlweiss, Microsoft Research Cambridge, UK; Romain Laborde, Institut de
Recherche en Informatique de Toulouse(IRIT), France; Jorn Lapon,
Katholieke Hogeschool Sint-Lieven, Belgium; Herbert Leitold, Secure
Information Technology Center (A-SIT),Austria; Javier Lopez, University
of Malaga, Spain; Louis Marinos, European Network and Information
Security Agency(ENISA), Greece; Keith Martin, Royal Holloway, University
of London, UK; Chris Mitchell, Royal Holloway, University of London, UK;
Refik Molva, Eurécom, France; Yuko Murayama, Iwate Prefectural
University, Japan; Vincent Naessens, Katholieke Hogeschool Sint-Lieven,
Belgium; Nick Nikiforakis, KU Leuven, Belgium; Chandrasekaran
Pandurangan, Indian Institute of Technology, Madras, India; Günther
Pernul, University of Regensburg, Germany; Alessandro Piva, University
of Florence, Italy; Franz-Stefan Preiss, IBM Research Zurich,
Switzerland; Jean-Jacques Quisquater, Université catholique de Louvain,
Belgium; Kai Rannenberg, Goethe University Frankfurt, Germany;
Pierangela Samarati, Università degli Studi di Milano, Italy; Riccardo
Scandariato, KU Leuven, Belgium; Ingrid Schaumüller-Bichl, University of
Applied Sciences Upper Austria,Hagenberg, Austria; Jörg Schwenk, Ruhr
University Bochum, Germany; Stefaan Seys, KU Leuven, Belgium; Einar
Snekkenes, Gjovik University College, Norway; Andreas Uhl, University of
Salzburg, Austria; Umut Uludag, Scientific and Technological Research
Council(TÜBITAK), Turkey; Vijay Varadharajan, Macquarie University,
Australia; Pedro Veiga, University of Lisbon;Claus Vielhauer,
Brandenburg University of Applied Sciences, Germany; Tatjana Welzer,
University of Maribor, Slovenia, Andreas Westfeld, University of Applied
Sciences, Dresden, Germany; Ted Wobber, Microsoft Research Silicon
Valley, US; Shouhuai Xu, University of Texas at San Antonio, USA; Moti
Yung, Google & Columbia University, USA; Ge Zhang, Clavister AB &
Karlstad University, Sweden; Gansen Zhao, South China Normal University,
China

Related Resources

SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
SCID @ AsiaCCS 2025   The 2nd workshop on Security-Centric Strategies for Combating Information Disorder