[Om-announce] CFP for CIS-TC Security Symposium at ICC'14 in Sidney

Shui Yu shuiyucfp at gmail.com
Sun Aug 25 02:14:44 CEST 2013


We apology for possible cross-posting.

---

IEEE International Conference on Communications
IEEE ICC 2014
Communications: The Centrepoint of Digital Economy
16 - 20 June 2014, Sydney, Australia

*Communications and Information Systems Security Symposium (CISS)*

The 2014 IEEE International Conference on Communications (ICC) will be held
in the beautiful city of Sydney, Australia between 16 and 20 June 2014. The
theme of this flagship conference of IEEE Communications Society for 2014
is “Communications: The Centrepoint of Digital Economy.” The conference
will feature a comprehensive technical program including twelve Symposia
and a number of Tutorials and Workshops. IEEE ICC 2014 will also include an
attractive expo program including keynote speakers, and Industry Forum &
Exhibitions (IF&E). We invite you to submit your original technical papers,
industry forum, workshop, and tutorial proposals to this event. Accepted
and presented papers will be published in the IEEE ICC 2014 Conference
Proceedings and in IEEE Xplore®. Full details of submission procedures are
available at http://www.ieee-icc.org/2014.

Scope and Topics of Interest:
The Communications and Information Systems Security Symposium (CISS) will
focus on all aspects of security, privacy, trust, and risk management,
which pose a serious challenge to today's globally connected society. The
symposium welcomes novel contributions on evaluation, modeling, analysis,
and design of communication and information systems security solutions,
from the physical layer to the application layer. In addition, this year’s
CISS puts a stronger emphasis on network oriented security and privacy,
such as security related topics of cloud computing, networking related
security in Big Data, IoT, and so on.

To ensure complete coverage of the advances in communication and
information systems security, the topics of interest of the CISS include,
but are not limited to, the following areas:
- Anonymity, anonymous communication, metrics and their performance analysis
- Authentication protocols and message authentication
- Authorization and access control
- Availability and survivability of secure services and systems
- Big Data security and privacy
- Biometric security
- Botnet detection, prevention, and defense
- Cloud and distributed application security
- Computer and network forensics
- Cryptography and evaluation
- Data center security
- Firewall technologies; intrusion detection, localization, and avoidance
- Formal trust models, security modeling and protocol design
- Key distribution and management
- Lightweight security
- Location-based services and their security and privacy aspects
- Mobile and Wireless network security
- Mobile App security and privacy
- Multi-mode surveillance and homeland security
- Network public opinion analysis and monitoring
- Network security metrics and their performance evaluation
- Operating systems and application security and analysis tools
- Online Social Networks and their security aspects
- Physical security and hardware/software security
- Privacy and privacy enhancing technologies
- Quantum cryptography and communication applications
- Resource allocation, incentives, and game-theoretic approaches
- Security in virtual machine environments
- Security in wired systems and optical networks
- Security of Cyber-physical systems
- Security risk management
- Trust models, management and certificate handling
- Virtual private networks and group security
- Vulnerability, exploitation tools and virus analysis
- Web, e-commerce, and m-commerce security

Submission Guidelines:
Prospective authors are invited to submit original technical papers by the
deadline 15 September 2013 for publication in the IEEE ICC 2014 Conference
Proceedings and for oral or poster presentation(s). All submissions should
be written in English with a maximum paper length of six (6) printed pages
(10-point font) including figures without incurring additional page charges
(a maximum of one additional page will be accepted, subject to over-length
charge).

Standard IEEE Transactions templates for Microsoft Word or LaTeX formats
found at
http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html
Alternatively you can follow the sample instructions in template.pdf at
http://www.comsoc.org/confs/globecom/2008/downloads/template.pdf
Only PDF files will be accepted for the review process and all submissions
must be done through EDAS at
https://edas.info/newPaper.php?c=15399

Important dates:
Paper Submission:        15 September 2013
Acceptance Notification: 12 January 2014
Camera-Ready:            13 February 2014

Symposium Co-Chairs:
Peter Mueller, IBM Zurich Research, Switzerland, pmu [at] zurich.ibm.com
Shui Yu, Deakin University, Australia, syu [at] deakin.edu.au
Thorsten Strufe, TU Darmstadt, Germany, strufe [at] cs.tu-darmstadt.de.
----------------------------------------------------------------------------

-- 

 -----------------------------

Shui YU, PhD, Senior Lecturer

School of Information Technology, Deakin University,

221 Burwood Highway, Burwood, VIC 3125,  Australia.

Telephone:0061 3 9251 7744

http://www.deakin.edu.au/~syu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openmath.org/pipermail/om-announce/attachments/20130825/baf32f32/attachment-0001.html>


More information about the Om-announce mailing list