| |||||||||||||||
SNDS 2014 : Second International Conference on Security in Computer Networks and Distributed Systems | |||||||||||||||
Link: http://www.iiitmk.ac.in/snds/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
SNDS invites submissions containing original ideas that are relevant to the scope of the conference. Like other conferences, SNDS requires that papers not be submitted simultaneously to any other conferences or publications; that submissions not be previously published in peer-reviewed conferences; and that accepted papers not be subsequently published elsewhere. Papers describing work that was previously published in a peer-reviewed workshop are allowed, if the authors clearly describe what significant new content has been included.
Authors should submit their papers online. We use EDAS system for submission of papers and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here. The manuscripts should be submitted in PDF format. All submitted papers will be subjected to a "similarity test" by EDAS paper similarity checker. Papers achieving a high similarity score will be examined and those that are deemed unacceptable will be rejected/withdrawn without a formal review. Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The contents will be included in the CCIS electronic book series hosted in the SpringerLink digital library. Paper Length: 12 pages maximum Springer Author Guidelines: PDF Springer CCIS Manuscript Template: (Word format, LaTeX format) All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All the accepted papers will be published in the conference proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline. We welcome submissions for SNDS-2014's Technical Program in the following areas and not limited to: Track 1: Cryptosystems, Algorithms, Primitives Cryptographic Algorithms, Hash Functions Cryptographic Primitives and Security Protocols Digital Signatures Key Distribution and Management Analysis of Security Protocols Privacy, Anonymity and Untraceability Identity Management Provable Security Efficient Implementation Track 2: Security and Privacy in Networked Systems P2P, Grid and Cloud Mobile, Ad Hoc, VANET and Sensor Networks Social Networks Satellite Networks Wireless Networks Distributed Database Systems E-Governance and E-commerce Future Home Networks, Internet of Things, Body-area Networks, Pervasive Services Track 3: System and Network Security Secure Operating Systems Malwares Business Continuity & Disaster Recovery Planning Insider Threats and Countermeasures Hacking and Defending Network Intrusion Detection and Prevention, Firewalls, Packet Filters Network Security Policies: Implementation Deployment, Management High Performance Security Systems Securing Storage: SAN/NAS Security Database and System Security Internet Security & Applications: IPsec, VPNs and Encryption Modes Web Security, Web Services and Enterprise Security Access Controls and Security Mechanisms Attack Data Acquisition and Network Monitoring Secure Routing, Naming/Addressing, and Network Management Security in Cellular and Content-delivery Networks Security in High speed Network Security in Optical Systems and Networks Trustworthy Computing for Network Protocols and Distributed Systems Forensics of Network and Distributed Systems Public key Infrastructures, Key Management, Certification, and Revocation Cyber warfare and Physical Security Track 4: Multimedia Security Digital Rights Management Steganography and Digital Watermarking Intelligent Multimedia Security Services Image, Audio and Video Encryption Mechanisms Security of VOIP and multimedia Privacy and Security in Surveillance Videos Multimedia Forensics Visual Event Computation Track 5: Security Modeling, Experiments, Simulation, and Tools Security Metrics and Measurements Security Models and Security Policies Security Simulation and Tools Tradeoff Analysis between Performance and Security Automated Protocols Analysis Large-scale Attacks and Defense Implementation and Experimental Testbeds Vulnerability Analysis Track 6: Other Security Topics Biometrics Trust and Reputation Security Issues in Software Engineering Code Obfuscation Hardware-based Security Side Channel Attacks Embedded System Security Secure Mobile Agents and Mobile Code Ethical and Legal Implications of Security and Privacy Language-based Security Security Standards Security for Critical Infrastructures Security in Pervasive/Ubiquitous Computing Social and Human Implications of Security and Privacy Active and Adaptive Defense Systems Security and Privacy in Location-based Services and Complex Systems Security Through Collaboration Management of Computing Security Information Assurance Reliability and dependability Policy Based Management for Security, Privacy and Trust Best Paper Awards As evaluated by TPC Chairs and TPC Members, THREE papers will be given Best Paper Award for SNDS-2014 viz 1st, 2nd and 3rd respectively. The above committee will expect the presentation of the selected best papers during the conference before finalizing the list. The winners will be declared during the conference. Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s): International Journal of Trust Management in Computing and Communications (IJTMCC) ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland http://www.inderscience.com/IJTMCC |
|