posted by user: kevinrbbutler || 4394 views || tracked by 5 users: [display]

NPSec 2012 : 7th Workshop on Secure Network Protocols


When Oct 30, 2012 - Oct 30, 2012
Where Austin, TX, USA
Submission Deadline Jul 16, 2012
Notification Due Aug 31, 2012
Final Version Due Sep 20, 2012
Categories    security   networking   protocols

Call For Papers

NPSec 2012
7th Workshop on Secure Network Protocols
Austin, TX, USA, October 30, 2012

In conjunction with ICNP 2012
(Austin, TX, USA, October 30 - November 2, 2012)

=== Scope ===

The 7th workshop on Secure Network Protocols (NPSec 2012) is a one-day
event held in conjunction with the 20th IEEE International Conference on
Network Protocols (ICNP 2012). NPSec 2012 focuses on two general areas.
The first focus is on the development and analysis of secure or hardened
protocols for the operation (establishment and maintenance) of network
infrastructure, including such targets as secure multidomain, ad hoc,
sensor or overlay networks, or other related target areas. This can
include new protocols, enhancements to existing protocols, protocol
analysis, and new attacks on existing protocols. The second focus is on
employing such secure network protocols to create or enhance network
applications. Examples include collaborative firewalls, incentive
strategies for multiparty networks, and deployment strategies to enable
secure applications.

NPSec 2012 particularly welcomes new ideas on security in the context of
future Internet design, such as architectural considerations for future
Internet security and new primitives for supporting secure network
protocol and application design.

Topics of interest include but are not limited to:

* Security in future Internet architectures (role of security in
future architectures, integrating security in future protocols and
* Secure and/or resilient network protocols (e.g., internetworking/routing,
MANETs, LANs and WLANs, mobile/cellular data networks, P2P and other
overlay networks, federated trust systems, sensor networks)
* Vulnerabilities of existing protocols and applications (both
theoretical and case studies), including attacks
* Key distribution/management
* Intrusion detection and response
* Incentive systems for P2P systems and MANET routing
* Secure protocol configuration and deployment
* Challenges and security protocols for social networks

The submission website is now available, and papers may be submitted at Formatting and
submission instructions are available on the NPSec website, at

=== Important dates ===

* Submission Deadline: EXTENDED to July 16, 2012 (11:59pm PDT)
* Notification of acceptance: August 31, 2012
* Camera ready version: September 20, 2012
* Workshop: October 30, 2012

=== Organizers ===

Technical Program Committee Chairs:
* Ivan Martinovic, University of Oxford, UK
* Alex Liu, Michigan State University, USA

Publicity Chair:
* Kevin Butler, University of Oregon, USA

Web Chair:
* Fei Chen, VMware Inc., USA

Proceedings/Submission Chair:
* Matthias Wilhelm, TU Kaiserslautern, DE

NPSec Steering Committee:
* Sonia Fahmy, Purdue University, USA (chair)
* George Kesidis, Penn State University, USA
* Cristina Nita-Rotaru, Purdue University, USA
* Gene Tsudik, UC Irvine, USA

Related Resources

SIGCOMM 2020   Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
AVC 2020   Advances in Vision Computing: An International Journal
ICNP 2020   The 28th IEEE International Conference on Network Protocols
CCNET 2020   7th International Conference on Computer Networks & Communications
ICMLANT 2020   IEEE International Conference on Machine Learning and Applied Network Technologies
IJCCSA 2020   International Journal on Cloud Computing: Services and Architecture
COMPLEX NETWORKS 2020   COMPLEX NETWORKS 2020 : The Ninth International Conference on Complex Networks and their Applications
ADCO 2020   7th International Conference on Advanced Computing
NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
DASC 2020   The 18th IEEE Int’l Conference on Dependable, Autonomic and Secure Computing