posted by user: Bundesber || 7513 views || tracked by 10 users: [display]

SNDS 2014 : Second International Conference on Security in Computer Networks and Distributed Systems

FacebookTwitterLinkedInGoogle

Link: http://www.iiitmk.ac.in/snds/
 
When Mar 13, 2014 - Mar 14, 2014
Where Thiruvananthapuram (Trivandrum), India
Submission Deadline Nov 10, 2013
Notification Due Dec 15, 2013
Final Version Due Jul 12, 2015
Categories    security   networks   distributed systems
 

Call For Papers

SNDS invites submissions containing original ideas that are relevant to the scope of the conference. Like other conferences, SNDS requires that papers not be submitted simultaneously to any other conferences or publications; that submissions not be previously published in peer-reviewed conferences; and that accepted papers not be subsequently published elsewhere. Papers describing work that was previously published in a peer-reviewed workshop are allowed, if the authors clearly describe what significant new content has been included.

Authors should submit their papers online. We use EDAS system for submission of papers and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here. The manuscripts should be submitted in PDF format. All submitted papers will be subjected to a "similarity test" by EDAS paper similarity checker. Papers achieving a high similarity score will be examined and those that are deemed unacceptable will be rejected/withdrawn without a formal review.

Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The contents will be included in the CCIS electronic book series hosted in the SpringerLink digital library.

Paper Length: 12 pages maximum

Springer Author Guidelines: PDF

Springer CCIS Manuscript Template: (Word format, LaTeX format)

All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All the accepted papers will be published in the conference proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.

We welcome submissions for SNDS-2014's Technical Program in the following areas and not limited to:
Track 1: Cryptosystems, Algorithms, Primitives

Cryptographic Algorithms, Hash Functions
Cryptographic Primitives and Security Protocols
Digital Signatures
Key Distribution and Management
Analysis of Security Protocols
Privacy, Anonymity and Untraceability
Identity Management
Provable Security
Efficient Implementation

Track 2: Security and Privacy in Networked Systems

P2P, Grid and Cloud
Mobile, Ad Hoc, VANET and Sensor Networks
Social Networks
Satellite Networks
Wireless Networks
Distributed Database Systems
E-Governance and E-commerce
Future Home Networks, Internet of Things, Body-area Networks, Pervasive Services

Track 3: System and Network Security

Secure Operating Systems
Malwares
Business Continuity & Disaster Recovery Planning
Insider Threats and Countermeasures
Hacking and Defending
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Network Security Policies: Implementation Deployment, Management
High Performance Security Systems
Securing Storage: SAN/NAS Security
Database and System Security
Internet Security & Applications: IPsec, VPNs and Encryption Modes
Web Security, Web Services and Enterprise Security
Access Controls and Security Mechanisms
Attack Data Acquisition and Network Monitoring
Secure Routing, Naming/Addressing, and Network Management
Security in Cellular and Content-delivery Networks
Security in High speed Network
Security in Optical Systems and Networks
Trustworthy Computing for Network Protocols and Distributed Systems
Forensics of Network and Distributed Systems
Public key Infrastructures, Key Management, Certification, and Revocation
Cyber warfare and Physical Security


Track 4: Multimedia Security

Digital Rights Management
Steganography and Digital Watermarking
Intelligent Multimedia Security Services
Image, Audio and Video Encryption Mechanisms
Security of VOIP and multimedia
Privacy and Security in Surveillance Videos
Multimedia Forensics
Visual Event Computation

Track 5: Security Modeling, Experiments, Simulation, and Tools

Security Metrics and Measurements
Security Models and Security Policies
Security Simulation and Tools
Tradeoff Analysis between Performance and Security
Automated Protocols Analysis
Large-scale Attacks and Defense
Implementation and Experimental Testbeds
Vulnerability Analysis

Track 6: Other Security Topics

Biometrics
Trust and Reputation
Security Issues in Software Engineering
Code Obfuscation
Hardware-based Security
Side Channel Attacks
Embedded System Security
Secure Mobile Agents and Mobile Code
Ethical and Legal Implications of Security and Privacy
Language-based Security
Security Standards
Security for Critical Infrastructures
Security in Pervasive/Ubiquitous Computing
Social and Human Implications of Security and Privacy
Active and Adaptive Defense Systems
Security and Privacy in Location-based Services and Complex Systems
Security Through Collaboration
Management of Computing Security
Information Assurance
Reliability and dependability
Policy Based Management for Security, Privacy and Trust

Best Paper Awards

As evaluated by TPC Chairs and TPC Members, THREE papers will be given Best Paper Award for SNDS-2014 viz 1st, 2nd and 3rd respectively. The above committee will expect the presentation of the selected best papers during the conference before finalizing the list. The winners will be declared during the conference.

Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):

International Journal of Trust Management in Computing and Communications (IJTMCC)
ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland http://www.inderscience.com/IJTMCC

Related Resources

ISCSIC 2025   2025 9th International Symposium on Computer Science and Intelligent Control(ISCSIC 2025)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IJCSA 2024   International Journal on Computational Science & Applications
ICISIP 2025   The 12th IIAE International Conference on Intelligent Systems and Image Processing 2025
SVC 2025   6th International Conference on Signal Processing, VLSI Design & Communication Systems
ICSNC 2025   The Twentieth International Conference on Systems and Networks Communications