posted by user: NDSS || 25685 views || tracked by 69 users: [display]

NDSS 2014 : 21st Network & Distributed System Security Symposium


Conference Series : Network and Distributed System Security Symposium
When Feb 23, 2014 - Feb 26, 2014
Where San Diego, California
Abstract Registration Due Aug 5, 2013
Submission Deadline Aug 9, 2013
Notification Due Nov 1, 2013
Final Version Due Dec 6, 2013
Categories    security   distributed systems   networking   computer science

Call For Papers

The 21st Annual Network and Distributed System Security (NDSS) Symposium
The Catamaran Resort Hotel and Spa
San Diego, California
23-26 February 2014

Important Dates
- Titles and abstracts of papers due: Monday, 5 August 2013 (11:59 pm EDT)
- Full paper and panel submissions due: Friday, 9 August 2013 (11:59 pm EDT)
- Rebuttal period: 9 - 11 October 2013
- Author notification: Friday, 1 November 2013
- Final version of papers and panels due: Friday, 6 December 2013

Symposium Goals
The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technologies. The Proceedings are published by the Internet Society.

Technical Papers and Panels
Technical papers, panel proposals, and posters are solicited. Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. Double-submission will result in immediate rejection. The Program Committee may share information with other conference chairs and journal editors so as to detect such cases.

Technical papers should be written in English. Papers must not exceed 15 pages total (including the references and appendices). Papers must be formatted for US letter (not A4) size paper with margins of at least 0.75 in. on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates found at

Reviewing is double blind, and technical papers should thus be anonymized to conceal the authors' identities. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Committee. Papers that are not accepted as full technical papers may be invited by the Program Committee to be presented at the conference as short talks. Extended abstracts of such papers will appear on the Internet Society website but not in the proceedings. Priority will be given to papers that have fresh, unconventional ideas.

Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists.

Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.

Submissions are solicited in, but not limited to, the following areas:
* Anti-malware techniques: detection, analysis, and prevention
* Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
* Future Internet architecture and design
* High-availability wired and wireless networks
* Implementation, deployment and management of network security policies
* Integrating security in Internet protocols: routing, naming, network management
* Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
* Intrusion prevention, detection, and response
* Privacy and anonymity technologies
* Public key infrastructures, key management, certification, and revocation
* Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
* Security for collaborative applications: teleconferencing and video-conferencing
* Security for cloud computing
* Security for emerging technologies: sensor/wireless/mobile/personal networks and systems
* Security for future home networks, Internet of Things, body-area networks
* Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)
* Security for peer-to-peer and overlay network systems
* Security for Vehicular Ad-hoc Networks (VANETs)
* Security of Web-based applications and services
* Trustworthy Computing mechanisms to secure network protocols and distributed systems
* Usable security and privacy

The deadline for full submissions for technical papers and panels, made electronically in PDF format, is 11:59 pm EDT, 9 August 2013. However, titles and abstracts of papers must be received by 11:59 pm EDT, 5 August 2013. Each submission will be acknowledged by email; if acknowledgement is not received within 24 hours, contact the Program Committee chair. Authors will be given a chance to correct factual errors in early-round reviews during the rebuttal period, 9 - 11 October 2013. Authors and panel organizers will be notified of acceptance by 1 November 2013.

Submission site:

New in 2014, NDSS solicits proposals for collocated workshops to take place on Sunday, 23 February 2014. Workshop proposals should be up to three pages in length. Proposals should contain a technical description (including topics to be addressed, importance of these topics); publication policy (with or without official proceedings; any proceedings are expected to be published through the Internet Society); expected duration (full or half day) and number of participants; and a brief biography of the organizer(s), including workshop or conference organizing experience. Proposals should be submitted by email to the Program Committee chair by 15 July 2013. Each submission will be acknowledged by email; if acknowledgement is not received within 24 hours, contact the Program Committee chair.

New in 2014, posters are solicited that present recent and late-breaking research on topics relevant to NDSS. Two-page poster abstracts should be submitted to by 6 January 2014; authors will be notified of acceptance by 13 January 2014. Poster abstracts should be formatted like technical papers, but not anonymized; titles should start with the keyword, Poster. Poster abstracts will appear on the Internet Society website prior to the conference, but will not be included in the conference proceedings.

Related Resources

IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
IEEE, EI, Scopus-CVIV 2023   2023 5th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2023) -EI Compendex
PDCDP 2023   2023 International Conference on Parallel, Distributed Computing and Data Processing (PDCDP 2023)
ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
WOSOC 2023   2023 Workshop on SOC Operations and Construction
ACM-EI/Scopus-ITCC 2023   2023 3rd International Conference on Information Technology and Cloud Computing (ITCC 2023) -EI Compendex
HOST 2023   IEEE International Symposium on Hardware Oriented Security and Trust (Submission Window 2)
MSE 2023   7th International Conference on Materials Science and Engineering
ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)
DiCES-N 2023   Distributed Computing for Emerging Smart Networks