NordSec 2013 - NordSec
Topics/Call fo Papers
The 18th Nordic Conference on Secure IT Systems will take place at the Arctic Hotel in Ilulissat, Greenland, from 18th to 21st October 2013. NordSec addresses a broad range of topics within IT security with the aims of bringing together computer security researchers from around the world and of encouraging interaction between academia and industry. In 2013 the conference has special focus on the security challenges of cyber-physical systems as found within areas as for example avionics, automotive, energy, healthcare and consumer appliances.
NordSec 2013 welcomes contributions within, but not limited to, the following areas:
Applied cryptography
Communication and network security
Internet and web-security
Operating system security
Software security
Language-based techniques for security
Security protocols
Access control and security models
Privacy and anonymity
Trust and reputation management
Security evaluation and measurements
Commercial security policies and enforcement
Computer crime and information warfare
Social engineering and phishing
Intrusion detection
Security managements and audit
New ideas and paradigms in security
Contributions should reflect original research, developments, studies and experience. Papers should not exceed 16 pages (including references and appendices) in the Springer LNCS format; the proceedings will be published in the Lecture Notes in Computer Science. Additionally short papers are solicited for 5 minutes presentations; they will appear in locally printed proceedings.
NordSec 2013 welcomes contributions within, but not limited to, the following areas:
Applied cryptography
Communication and network security
Internet and web-security
Operating system security
Software security
Language-based techniques for security
Security protocols
Access control and security models
Privacy and anonymity
Trust and reputation management
Security evaluation and measurements
Commercial security policies and enforcement
Computer crime and information warfare
Social engineering and phishing
Intrusion detection
Security managements and audit
New ideas and paradigms in security
Contributions should reflect original research, developments, studies and experience. Papers should not exceed 16 pages (including references and appendices) in the Springer LNCS format; the proceedings will be published in the Lecture Notes in Computer Science. Additionally short papers are solicited for 5 minutes presentations; they will appear in locally printed proceedings.
Other CFPs
- 3rd Amsterdam Workshop on Social Networks and Organizations THEORETICAL ADVANCES IN NETWORK RESEARCH
- 5th International Conference on the Mechanics of Biomaterials and Tissues
- 3rd Workshop on Formal Methods in the Development of Software
- First International Conference on Global Food Security
- EEE MTT-S International Microwave Workshop Series on Wireless Communications and User-centered Services in Pervasive Environments
Last modified: 2013-02-28 23:20:36