2008-09-03
[Mycolleagues] IEEE ICC'09 - Submission Due Date: September 8th for the Security Symposium
*******************************************************************************
IEEE ICC 2009
Communication and Information Systems Security (CISS) Symposium
June 14.-18. 2009, Dresden, Germany
http://www.ieee-icc.org/2009/
CALL FOR PAPERS
Brief description
-----------------
With the advent of pervasive computer applications and due to the proliferation
of heterogeneous wired and wireless computer and communication networks,
security and privacy issues have become paramount. This Symposium will address
all aspects of the modeling, design, implementation, deployment, and management
of security algorithms, protocols, architectures, and systems. Furthermore,
contributions devoted to the evaluation, optimization, or enhancement of
security and privacy mechanisms for current technologies, as well as devising
efficient security and privacy solutions for emerging technologies, are
solicited.
Topics of interest
------------------
Topics of interest include, but are not limited to, the following:
- Authentication protocols and message authentication
- Biometric security: technologies, risks, vulnerabilities, bio-cryptography,
mobile template protection
- Computer and network forensics
- Cryptography: Conventional public-key crypto, symmetric-key crypto, advanced
crypto, and quantum crypto
- DDOS attacks, DNS spoofing, and countermeasures
- Formal trust models
- Information hiding and watermarking
- Information systems security
- Intrusion detection, localization, and countermeasures
- Mobile and Wireless network security, including ad hoc networks, P2P
networks,3G, 4G, sensor networks, Bluetooth, 802.11 family and WiMAX
- Network security metrics and performance
- Network traffic analysis techniques
- Operating systems security and log analysis tools
- Optical network security
- Privacy and privacy enhancing technologies
- Security modeling and protocol design
- Virtual private networks
- VoIP Security
- Vulnerability, exploitation tools and virus analysis
- Web, eBusiness, eCommerce, eGovernment security
Sponsoring Technical Committees
-------------------------------
IEEE ComSoc Communications and Information Security (CISTC);
IEEE ComSoc Radio Communications (RCC);
Important Dates
---------------
Papers submission deadline: September 8, 2008
Notification of decision: January 15, 2009
Camera-ready deadline: March 1, 2009
Instructions for Authors
------------------------
Papers must represent high-quality and previously unpublished work. Original
research papers are solicited in all areas of communication and information
systems security. All submissions will be handled electronically through the
EDAS conference management system at www.edas.info and must be in pdf format,
with a maximum length of five pages. A formatting template may be found at
http://www.ieee.org/web/publications/authors/transjnl/index.html.
IEEE ICC 2009 CISS Symposium co-Chairs
--------------------------------------
Raouf Boutaba, University of Waterloo, Canada (rboutaba@bbcr.uwaterloo.ca)
Stefanos Gritzalis, University of the Aegean, Greece (sgritz@aegean.gr)
Jiankun Hu, RMIT University, Australia (jiankun@cs.rmit.edu.au)
Peter Muller, IBM Zurich Research Laboratory, Switzerland (pmu@zurich.ibm.com)
*******************************************************************************
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment