| |||||||||||||||
sppcn 2015 : The 2nd workshop on security and privacy protection in computer and network systems | |||||||||||||||
Link: http://trust.csu.edu.cn/conference/sppcn2015/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Overview
In recent years, computer applications and Internet services have been contributing extensively to our life experience and, simultaneously, they are vulnerable and undergo permanent attacks. Thus we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving privacy and security at the same time. The objective of this workshop (SPPCN 2015) is to present research and developing activities original unpublished results related to all aspects of privacy and security in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. We invite both theoretical, applied research papers, case studies, implementation experiences as well as work-in-progress presentations. Distinguished selected high-quality papers from the workshop, after further significant extensions, will be recommended for submission and possible publication in the Special Issue of an SCI-indexed international journal. Scope and Topics The topics of interest include, but are not limited to: Network security and privacy Applied cryptography Peer-to-peer security System security Web security Attacks and defenses Wireless and mobile networks security Distributed systems security Application-level security Embedded system security Hardware-based security Information security and hiding Access control Anonymity Physical security Language-based security Privacy-preserving systems Secure protocols Usability and security Security architectures Security in cloud Paper Submission Guideline Prospective authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. All papers must be clearly presented in English, must not exceed 10 pages (or 14 pages with the over length charge), including tables, figures, references and appendixes, in Springer LNCS Format with Portable Document Format (.pdf). All papers will be peer reviewed and the comments will be provided to the authors. Once accepted, the paper will be included into the conference proceedings published by Springer Lecture Notes in Computer Science, and will be indexed by EI. Authors (at least one) of any accepted paper are requested to register at the conference. |
|