ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CISSS 2012 - Communications and Information Systems Security Symposium

Date2012-12-03

Deadline2012-03-15

VenueAnaheim, USA - United States USA - United States

Keywords

Website

Topics/Call fo Papers

Communications and Information Systems Security Symposium at GlobeCom 2012
http://www.ieee-globecom.org/2012/
3-7 December 2012
Anaheim, CA, USA
Scope and Motivation:
With the advent of tomorrow’s global connectivity of resources and contents,
all aspects of security, privacy, anonymity and trust have become a vital
issue to any institution as well as individuals. The Symposium on
Communication and Information Systems Security (CIS) welcomes manuscripts on
new aspects, from theory to implementation and operation, which address these
issues. Furthermore, also contributions devoted to the evaluation,
optimization, or enhancement of security and privacy mechanisms for current
technologies and applications, as well as efficient security and privacy s
olutions for emerging areas from physical layer technology to the application
layer, are solicited.
Submitted manuscripts should represent high-quality and previously unpublished
work and may not be submitted in parallel to other conferences or journals.
Main Topics of Interest:
- Anonymity, anonymous communication, measures and performance analysis
- Authentication protocols and message authentication
- Availability of secure services and systems
- Biometric security: technologies, risks, vulnerabilities, bio-cryptography,
mobile template protection
- Botnets prevention, detection and defense
- Cloud and distributed application security
- Computer and network forensics
- DDOS attacks, DNS spoofing, intrusion, localization and countermeasures
- Digital behavior management
- Digital right management: information hiding, watermarking, fingerprinting,
and traitor tracing scheme
- Firewall technologies
- Formal trust models, security modeling and protocol design
- Identity management
- Information systems security and security management
- Integrity
- Lightweight security
- Mobile and Wireless network security, including ad hoc networks, P2P networks,
3G, 4G, sensor networks, Bluetooth, 802.11 family and WiMAX
- Multi-mode surveillance and homeland security
- Network public opinion analysis and monitoring
- Network security metrics and performance
- Operating systems and application security and analysis tools
- Optical network security
- Physical security and hardware/software security
- Privacy and privacy enhancing technologies
- Public-key, symmetric-key, applied crypto, coding-based cryptography
- Quantum cryptography
- Security in virtual machine environments
- Security in wired systems
- Social engineering
- Traffic accountability
- Trust management and certificate handling
- Virtual private networks and group security
- VoIP, IPTV, DAB, and other multimedia security
- Vulnerability, exploitation tools and virus analysis
- Web, eBusiness, eCommerce, eGovernment security
Important Dates:
- Paper Submission: 15 March 2012
- Paper Acceptance: 1 July 2012
- Camera-Ready: 1 August 2012
- Conference: 3-7 December 2012
Submission Site:
http://edas.info/newPaper.php?c=11333
Email:
gc12ciss-AT-yahoo.com
Symposium Co-Chairs:
Wenjing Lou - Virginia Polytechnic Institute and State University, USA
Peter Mueller - IBM Zurich Research Laboratory, Switzerland
Shiguo Lian - France Telecom R&D, China

Last modified: 2012-03-13 19:17:57