| |||||||||||||||
SIN 2021 : Security of Information and NetworksConference Series : Security of Information and Networks | |||||||||||||||
Link: https://www.sinconf.org/sin2021/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged. Doctoral students are encouraged to propose papers on ongoing research.
Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following: Secure information systems ========================= Security, privacy, and trust of blockchain and distributed ledger technologies Consensus mechanisms, especially distributed control and processing applications Secure smart contracts Security in networks ===================== Network security and protocols Computer network defense Next-generation network architectures Autonomous and adaptive security Development and realization of fundamental technologies ======================================================= Cryptographic techniques and key management Post Quantum Cryptography Security schemes New algorithms IoT Security and Trust Malware analysis Access control and intrusion detection Computational intelligence techniques in security Trust and privacy Application Areas ================== detection and prevention of cybercrimes such as fraud and phishing Industrial applications of security Industrial experiences and challenges of security systems Security of cyber-physical systems Security tools and development platforms Security-aware software engineering Security challenges in Mobile/Embedded Systems Cloud security Security Awareness and Education Security Assurance =================== Critical analysis of existing approaches Interoperability, service levels and quality issues in security systems Information assurance, security, and public policy Security ontology, models, protocols & policies Standards, guidelines and certification Information assurance Types of submissions ====================== Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals of special session(s) to be held in the main conference are welcome Proposals of workshops to be held in conjunction with the conference are welcome. The theme of a workshop proposal should be closely related to a specific area of the conference topics. |
|