NDSS '12 2012 - 9th Network & Distributed System Security Symposium
Date2012-02-05
Deadline2011-08-09
VenueSan Diego, USA - United States
Keywordssecurity; networking; distributed systems
Topics/Call fo Papers
NDSS '12
Hilton San Diego Resort & Spa
San Diego, California
February 5-8, 2012
Important dates
* Titles and abstracts of papers due: Tuesday, 9 August 2011 (11:59 pm ET)
* Full paper and panel submissions due: Tuesday, 16 August 2011 (11:59 pm ET)
* Author notification: Sunday, 23 October 2011
* Final version of papers and panels due: Friday, 2 December 2011
Symposium Goals
The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society (ISOC).
Submissions
Technical full and *short* papers and panel proposals are solicited. Technical papers must not substantially overlap with material published at or simultaneously submitted to a venue with proceedings. Double-submission will result in immediate rejection. Reviewing of technical papers is double-blind, and they should be properly anonymized to conceal the authors' identity. *All* technical papers should be at most 15 pages (11-point font, single column, 1-inch margins, US letter or A4) excluding the bibliography and well-marked appendices, and at most 20 pages total. Papers accepted as short will be limited to 10 pages total (8 + 2 bibliography) in the proceedings. Papers should be intelligible without appendices. Panel proposals should be one page and must identify the panel chair, explain the topic and format, and list potential panelists. A panel description will appear in the proceedings, and may include written position statements from panelists.
Overall, we are looking for not only for solid results but also for crazy out of the box ideas. Areas of interest include (but are not limited to):
Network perimeter controls: firewalls, packet filters, application gateways
Network protocol security: routing, naming, network management
Cloud computing security
Security issues in Future Internet architecture and design
Security of web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Secure future home networks, Internet of Things, body-area networks
Intrusion prevention, detection, and response
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Security for wireless, mobile networks
Security of personal communication systems
Vehicular Ad-hoc Network (VANETs) Security
Security of peer-to-peer and overlay network systems
Electronic commerce security: e.g., payments, notarization, timestamping.
Network security policies: implementation deployment, management
Intellectual property protection: protocols, implementations, DRM
Public key infrastructures, key management, certification, and revocation
Security for Emerging Technologies
Special problems and case studies: cost, usability, security vs. efficiency
Collaborative applications: teleconferencing and video-conferencing
Smart Grid Security
Secure Electronic Voting
Security of large-scale critical infrastructures
Trustworthy Computing for network protocols and distributed systems
Network and distributed systems forensics
Hilton San Diego Resort & Spa
San Diego, California
February 5-8, 2012
Important dates
* Titles and abstracts of papers due: Tuesday, 9 August 2011 (11:59 pm ET)
* Full paper and panel submissions due: Tuesday, 16 August 2011 (11:59 pm ET)
* Author notification: Sunday, 23 October 2011
* Final version of papers and panels due: Friday, 2 December 2011
Symposium Goals
The Network and Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings are published by the Internet Society (ISOC).
Submissions
Technical full and *short* papers and panel proposals are solicited. Technical papers must not substantially overlap with material published at or simultaneously submitted to a venue with proceedings. Double-submission will result in immediate rejection. Reviewing of technical papers is double-blind, and they should be properly anonymized to conceal the authors' identity. *All* technical papers should be at most 15 pages (11-point font, single column, 1-inch margins, US letter or A4) excluding the bibliography and well-marked appendices, and at most 20 pages total. Papers accepted as short will be limited to 10 pages total (8 + 2 bibliography) in the proceedings. Papers should be intelligible without appendices. Panel proposals should be one page and must identify the panel chair, explain the topic and format, and list potential panelists. A panel description will appear in the proceedings, and may include written position statements from panelists.
Overall, we are looking for not only for solid results but also for crazy out of the box ideas. Areas of interest include (but are not limited to):
Network perimeter controls: firewalls, packet filters, application gateways
Network protocol security: routing, naming, network management
Cloud computing security
Security issues in Future Internet architecture and design
Security of web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Secure future home networks, Internet of Things, body-area networks
Intrusion prevention, detection, and response
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Security for wireless, mobile networks
Security of personal communication systems
Vehicular Ad-hoc Network (VANETs) Security
Security of peer-to-peer and overlay network systems
Electronic commerce security: e.g., payments, notarization, timestamping.
Network security policies: implementation deployment, management
Intellectual property protection: protocols, implementations, DRM
Public key infrastructures, key management, certification, and revocation
Security for Emerging Technologies
Special problems and case studies: cost, usability, security vs. efficiency
Collaborative applications: teleconferencing and video-conferencing
Smart Grid Security
Secure Electronic Voting
Security of large-scale critical infrastructures
Trustworthy Computing for network protocols and distributed systems
Network and distributed systems forensics
Other CFPs
Last modified: 2011-11-05 11:27:29