posted by user: Terppy || 11369 views || tracked by 23 users: [display]

CSP 2012 : The first International Workshop on Cyber Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.cyberc.org
 
When Oct 10, 2012 - Oct 12, 2012
Where Sanya China
Submission Deadline May 15, 2012
Notification Due Jul 10, 2012
Final Version Due Aug 1, 2012
Categories    security   information security   network security   computer security
 

Call For Papers

Co-Sponsored by:
IEEE Computer Society, IEEE Technical Committee on Simulation, IEEE CS Task Force on Networked Mobile Systems, Beijing Jiaotong University, and University of Louisville.

Patrons: AT&T, Huawei, InfoBeyond and Tech Mahindra

Sanya, China, October 10 - 12, 2012

We are living in the ubiquitous cyber networking environments and communicate on the move (COM). The cyber communication intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, air satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Some wireless communications are even covert and prevent to be detected or intercepted by the regular energy detectors. Cyber attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious. Consequently, the detections and preventions of these cyber attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new vulnerabilities such as ClickBot.A are emerging every day and they are even more stealthy and intelligent. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Clouds bring us new application along with new vulnerabilities that we have to investigate. CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.

Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:

• Cryptography and key algorithms
• Security modeling and vulnerability analysis
• Intrusion detection, traffic analysis and decision making of security
• Information integrity, assurance, trustworthy, authentication, and access control
• Distributed data storage and secure data management outsourcing (e.g., database as a service)
• Protocol security and privacy policies
• Distributed systems security
• Embedded systems security and forensics
• Network security and malware
• Networking protocols and security trace back
• Accountability and anonymity
• Security architectures, policy, and regulatory
• Hardware, application, and system security
• Censorship and censorship-resistance
• Language-based security
• Privacy-preserving systems
• Usability/energy/cost/efficiency of security in the network
• Security protocols and strategies in clouds, sensor, cognitive, ad hoc, mesh, and satellite networks

Important Days:

May 15, 2012 - Conference Paper Submission Deadline
July 10, 2012 - Notification of Acceptance/Rejection & Registration Starts
August 1, 2012 - Camera-Ready Paper Submission Due & Registration Due

Program Committee

Honorable General Chair
David Lu, AT&T Enterprise IT, USA

General Co-Chairs
Mahmoud Daneshmand, AT&T Labs, USA
Ratan Ghosh, Indian Institute of Technology, Kanpur, India

Program Co-Chairs
Bin Xie, InfoBeyond Technology LLC, USA
Charlie Yang, AT&T Labs, USA

Finance Chair
Yingbing Yu, Austin Peay State University, USA
Sanjuli Agrawal, Indiana University Southeast, USA

Publicity Co-Chairs
Na Bai, Southeast University, China
J.Octavio Gutierrez-Garcia, Gwangju Institute of Science and Technology, Republic of Korea
Ezziyyani Mostafa, University abdelmalk Essaâdi, Morocco
Shyan-ming Yuan, Providence University, Taiwan

Workshop Co-Chairs
Charlie Yang, AT&T Labs, USA
Chi-Tsun Cheng, University of Calgary, Canada
Bin Xie, InfoBeyond Technology LLC, USA

Local Coordination Co-Chairs
Dongmei Sun, Beijing Jiaotong University, China
Qingwen Han, Congqing University, China

Steering Committee
Anup Kumar, (Chair) University of Louisville, USA
Ratan Ghosh, Indian Institute of Technology, Kanpur, India
Qing-An Zheng, North Carolina A&T University, USA
Chi-Ming Chen, AT&T, USA
Liang-Jie Zhang, IBM Thomas J. Watson Research Center, USA

Technical Program Committee
Abraham George, Keyocera, India
Alok Srivastava, Microsoft Research, USA
Arturo Gonzalez-Escribano, University of Valladolid, Spain
Ash Mohammad Abbas, Aligarh Muslim University, India
Baoqiang Yan, Missouri Western State University, USA
Berk Canberk, Istanbul Technical University, Turkey
Bin Zhou, National University of Defense Technology, China
Chin-Ling Chen, National Pingtung Institute of Commerce, Taiwan
Chung-Hua Chu, National Taichung Institute of Technology, Taiwan
Dexing Zhong, Xi’an Jiaotong University, China
Diego R. Llanos, University of Valladolid, Spain
Eric Chen, NTT Corporation, Japan
Fernando Zacarias-Flores, Benemerita Universidad Autonoma de Puebla, MX
Fouad Chedid, Notre Dame University – Louaize, Lebanon
Guey-Yun Chang, National Central University, Taiwan
Hao Zhang, Central South University, China
Hend Al-Khalifa, King Saud University, Saudi Arabia
Jaeho Choi, Chonbuk National University, Korea
Jan-Jan Wu, Institute of Information Science, Taiwan
Jen-Jee Chen, National University of Taiwan, Taiwan
Jens-Matthias Bohli, NEC Laboratories Europe, Germany
Jinfang Sheng, Central South University, China
Lanxiang Chen, Fujian Normal University, China
Li Zeng, University of Texas at Arlington, USA
Li Zhao, Microsoft Corporation, USA
Liyu Xu, Excel Directional Technologies, USA
Maiga Chang, Athabasca University, Canada
Maximilien Gadouleau, Queen Mary, University of London, UK
Min Zhu, SiChuan University, China
Mohamed Farouk Abdel Hady, University of Ulm, Germany
Mohammed Abdala, AL-Nahrain University, Iraq
Narendra Chaudhari, Indian Institute of Technology Indore, India
Narisa Chu, CWLab International, Ltd., USA
Nedal Ababneh, Telecom Pairs, France
Patrick Hung, University of Ontario Institute of Technology, Canada
Raju Gottumukkala, University of Louisiana at Lafayette, USA
Rasha Osman, Imperial College of London, UK
Rich Lee, IBM, Taiwan
Rosalina Abd. Salam, Universiti Sains Islam Malaysia, Malaysia
Rossana Maria de Castro, Andrade Federal University of Ceará, Brazil
Ruhani Ab. Rahman, Universiti Teknologi MARA, Malaysia
Rui Tan, Michigan State University, USA
Sameh Abdel-Naby, University College Dublin, Ireland
SK Basu, Banaras Hindu University, India
Stefano Berretti, University of Florence, Italy
Subin Shen, Nanjing University of Posts & Telecommunications, China
Sun-Yuan Hsieh, National Cheng Kung University, Tainan
Tao Ma, Beijing University of Posts and Telecommunications, China
Taoi Hsu, Shih Hsin University, Taiwan
Visvasuresh Victor Govindaswamy, Texas A&M University-Texarkana, USA
Wei Guo, Nanjing University of Information Science and Technology, China
Wei Wei, Xi'an Jiaotong University, China
Weixing Wang, South China Agricultural University, China
Xiaoyan Zhu, Xidian University, China
Y. Tanaka, Hokkaido University, Japan
Yang Liu, University of Louisville, USA
Yangjun Chen, Winnipeg University, Canada
Yili Gong, Wuhan University, China
Yong Zhao, University of Electronic and Science Technology of China, China
Yun Huoy Choo, Universiti Teknikal Malaysia Melaka, Malaysia
Zhengbao Li, Shandong Academy of Sciences, China

Manuscript Guidelines

Paper Submission Web: http://edas.info/ by clicking on CSP 2012
Paper Submission Email: Papers@cyberc.org

All submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see ftp://pubftp.computer.org/Press/ Outgoing/proceedings/. Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English.

Manuscript submission procedure is available over the Web at http://edas.info/. We encourage you to use edas online submission by selecting “CSP 2012”. If you have troubles in using the Web submission, you can also submit your paper to papers@cyberc.org or contact us. Electronic submissions must be in the form of a readable PDF file.

Submitted manuscripts have to present the original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conference. Submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered.

Paper Acceptance

Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.

Publications
All accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer Society's Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will be further arranged for indexing through IEE INSPEC, EI (Compendex), and Thomson ISI. Authors of accepted papers, or at least one of them, should register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE Xplore and EI after the conference.

CyberC Facebook

http://www.facebook.com/groups/nasirsyed.utp/


CyberC Weibo

http://weibo.com/u/2500282610


Contact:
For more information about the conference, please visit www.CyberC.org or contact us at Papers@CyberC.org.



Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
BIOSIG 2025   International Conference of the Biometrics Special Interest Group
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BIOSIG 2025   International Conference of the Biometrics Special Interest Group