ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CISS 2013 - Communications and Information Systems Security Symposium (CISS)

Date2013-06-09 - 2013-06-13

Deadline2012-10-07

VenueBudapest, Hungary Hungary

Keywords

Websitehttps://www.ieee-icc.org/2013

Topics/Call fo Papers

Communications and Information Systems Security Symposium (CISS)
ICC 2013, June 9-13, 2013, Budapest, Hungary
The 2013 IEEE International Conference on Communications (ICC) will be held in the vibrant city of Budapest, Hungary from 9 - 13 June 2013. This flagship conference of IEEE Communications Society aims at addressing an essential theme on "Bridging the Broadband Divide." The conference will feature a comprehensive technical program including several Symposia and a number of Tutorials and Workshops. IEEE ICC 2013 will also include an attractive expo program including keynote speakers, various Business, Technology and Industry forum, and vendor exhibits. We invite you to submit your original technical papers, industry forum, workshop, and tutorial proposals to this event. Accepted and presented papers will be published in the IEEE ICC 2013 Conference Proceedings and in IEEEXplore. Full details of submission procedures are available at http://www.ieee-icc.org/2013.
Scope and Topics of Interest
The Communications and Information Systems Security Symposium (CISS) will focus on all aspects of security, privacy, trust, and risk management, which pose a serious challenge to today's globally connected society. The symposium welcomes novel contributions on evaluation, modeling, analysis, and design of communication and information systems security solutions, from the physical layer to the application layer. In addition, this year's CISS emphasizes security risk management of information systems where quantitative models are utilized to balance available resources against security risks.
To ensure a complete coverage of the advances in communication and information systems security, the CISS presents original contributions in, but not limited to, the following topical areas:
- Anonymity, anonymous communication, measures and performance analysis
- Authentication protocols and message authentication
- Authorization and access control
- Availability and survivability of secure services and systems
- Biometric security: technologies, risks, vulnerabilities, bio-cryptography, anonymity and privacy
- Botnet prevention, detection and defense
- Cloud and distributed application security
- Computer and network forensics
- Cyber security
- Datacenter security
- DDOS attacks, DNS spoofing, intrusion, localization and countermeasures
- Digital rights management: information hiding, watermarking, and fingerprinting
- Firewall technologies; intrusion detection, localization, and avoidance
- Formal trust models, security modeling and protocol design
- Identity management
- Information systems security and security management
- Integrity
- IPv6 and future Internet security
- Key distribution and management
- Lightweight security
- Mobile and Wireless network security, including ad hoc networks, P2P networks, 3G, 4G, sensor networks, Bluetooth, 802.11 family and WiMAX
- Multi-mode surveillance and homeland security
- Multimedia security including VoIP, IPTV, DAB
- Network public opinion analysis and monitoring
- Network security metrics and performance evaluation
- Operating systems and application security and analysis tools
- Physical security and hardware/software security
- Privacy and privacy enhancing technologies
- Public-key, symmetric-key, applied crypto, coding-based applied cryptography
- Quantum cryptography and communication applications
- Resource allocation, incentives, and game-theoretic approaches
- Security in virtual machine environments
- Security in wired systems and optical networks
- Security of Cyber-physical systems
- Security risk management
- Trust models, management and certificate handling
- Virtual private networks and group security
- Vulnerability, exploitation tools and virus analysis
- Web, e-commerce, and m-commerce security
Submission Guidelines
Prospective authors are invited to submit original technical papers by the final deadline October 7, 2012 (23:59 EDT) for publication in the IEEE ICC 2013 Conference Proceedings and for oral or poster presentation(s).
All submissions should be written in English with a maximum paper length of Five (5) printed pages (10- point font) including figures without incurring additional page charges (maximum 1 additional page with over length page charge if accepted).
It is strongly recommended to use the standard IEEE templates for preparing your manuscripts.
Standard IEEE templates for Microsoft Word or LaTeX formats can be found at http://www.ieee.org/conferences_events/conferences....
Only PDF files will be accepted for the review process and all submissions must be done through EDAS at http://edas.info/N12645.
Symposium Co-Chairs
Tansu Alpcan, The University of Melbourne, Australia
Email: tansu.alpcan-AT-unimelb.edu.au
Mark Felegyhazi, Budapest University of Technology and Economics, Hungary
Email: mfelegyhazi-AT-crysys.hu
Kejie Lu, University of Puerto Rico at Mayaguez
Email: kejie.lu-AT-upr.edu.
----------------------------------------------------------------------------

Last modified: 2012-10-04 12:34:02