posted by user: Bundesber || 7476 views || tracked by 10 users: [display]

SNDS 2014 : Second International Conference on Security in Computer Networks and Distributed Systems

FacebookTwitterLinkedInGoogle

Link: http://www.iiitmk.ac.in/snds/
 
When Mar 13, 2014 - Mar 14, 2014
Where Thiruvananthapuram (Trivandrum), India
Submission Deadline Nov 10, 2013
Notification Due Dec 15, 2013
Final Version Due Jul 12, 2015
Categories    security   networks   distributed systems
 

Call For Papers

SNDS invites submissions containing original ideas that are relevant to the scope of the conference. Like other conferences, SNDS requires that papers not be submitted simultaneously to any other conferences or publications; that submissions not be previously published in peer-reviewed conferences; and that accepted papers not be subsequently published elsewhere. Papers describing work that was previously published in a peer-reviewed workshop are allowed, if the authors clearly describe what significant new content has been included.

Authors should submit their papers online. We use EDAS system for submission of papers and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here. The manuscripts should be submitted in PDF format. All submitted papers will be subjected to a "similarity test" by EDAS paper similarity checker. Papers achieving a high similarity score will be examined and those that are deemed unacceptable will be rejected/withdrawn without a formal review.

Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The contents will be included in the CCIS electronic book series hosted in the SpringerLink digital library.

Paper Length: 12 pages maximum

Springer Author Guidelines: PDF

Springer CCIS Manuscript Template: (Word format, LaTeX format)

All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All the accepted papers will be published in the conference proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.

We welcome submissions for SNDS-2014's Technical Program in the following areas and not limited to:
Track 1: Cryptosystems, Algorithms, Primitives

Cryptographic Algorithms, Hash Functions
Cryptographic Primitives and Security Protocols
Digital Signatures
Key Distribution and Management
Analysis of Security Protocols
Privacy, Anonymity and Untraceability
Identity Management
Provable Security
Efficient Implementation

Track 2: Security and Privacy in Networked Systems

P2P, Grid and Cloud
Mobile, Ad Hoc, VANET and Sensor Networks
Social Networks
Satellite Networks
Wireless Networks
Distributed Database Systems
E-Governance and E-commerce
Future Home Networks, Internet of Things, Body-area Networks, Pervasive Services

Track 3: System and Network Security

Secure Operating Systems
Malwares
Business Continuity & Disaster Recovery Planning
Insider Threats and Countermeasures
Hacking and Defending
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Network Security Policies: Implementation Deployment, Management
High Performance Security Systems
Securing Storage: SAN/NAS Security
Database and System Security
Internet Security & Applications: IPsec, VPNs and Encryption Modes
Web Security, Web Services and Enterprise Security
Access Controls and Security Mechanisms
Attack Data Acquisition and Network Monitoring
Secure Routing, Naming/Addressing, and Network Management
Security in Cellular and Content-delivery Networks
Security in High speed Network
Security in Optical Systems and Networks
Trustworthy Computing for Network Protocols and Distributed Systems
Forensics of Network and Distributed Systems
Public key Infrastructures, Key Management, Certification, and Revocation
Cyber warfare and Physical Security


Track 4: Multimedia Security

Digital Rights Management
Steganography and Digital Watermarking
Intelligent Multimedia Security Services
Image, Audio and Video Encryption Mechanisms
Security of VOIP and multimedia
Privacy and Security in Surveillance Videos
Multimedia Forensics
Visual Event Computation

Track 5: Security Modeling, Experiments, Simulation, and Tools

Security Metrics and Measurements
Security Models and Security Policies
Security Simulation and Tools
Tradeoff Analysis between Performance and Security
Automated Protocols Analysis
Large-scale Attacks and Defense
Implementation and Experimental Testbeds
Vulnerability Analysis

Track 6: Other Security Topics

Biometrics
Trust and Reputation
Security Issues in Software Engineering
Code Obfuscation
Hardware-based Security
Side Channel Attacks
Embedded System Security
Secure Mobile Agents and Mobile Code
Ethical and Legal Implications of Security and Privacy
Language-based Security
Security Standards
Security for Critical Infrastructures
Security in Pervasive/Ubiquitous Computing
Social and Human Implications of Security and Privacy
Active and Adaptive Defense Systems
Security and Privacy in Location-based Services and Complex Systems
Security Through Collaboration
Management of Computing Security
Information Assurance
Reliability and dependability
Policy Based Management for Security, Privacy and Trust

Best Paper Awards

As evaluated by TPC Chairs and TPC Members, THREE papers will be given Best Paper Award for SNDS-2014 viz 1st, 2nd and 3rd respectively. The above committee will expect the presentation of the selected best papers during the conference before finalizing the list. The winners will be declared during the conference.

Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):

International Journal of Trust Management in Computing and Communications (IJTMCC)
ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland http://www.inderscience.com/IJTMCC

Related Resources

DiCES-N 2025   Distributed Computing for Emerging Smart Networks Workshop
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ICISIP 2025   The 12th IIAE International Conference on Intelligent Systems and Image Processing 2025
SmartMultimedia 2025   International Conference on SMART MULTIMEDIA
SVC 2025   6th International Conference on Signal Processing, VLSI Design & Communication Systems