[Om-announce] IEEE SSCC 2016: CFP for the Fourth International Symposium on Security in Computing and Communications (SSCC’16), September 21-24, 2016, Jaipur, India
Alam
zakirul_alam at yahoo.com
Sun Mar 20 00:20:49 CET 2016
-- Apologies for cross-postings!** Please forward to anyone who might be interested ** -------------------------------------------------------------------------------------------Fourth International Symposium on Security in Computing and Communications (SSCC’16)September 21-24, 2016, Jaipur, India
http://acn-conference.org/sscc2016/--------------------------------------------------------------------------------------------SSCC’16 aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. SSCC'16 will be held in Jaipur, India. Jaipur is a major tourist attraction in India and belongs to the tourist Golden Triangle of Delhi, Jaipur and Agra. The Symposium will feature plenary/keynote talks, workshops, demonstrations, parallel technical sessions and tutorials.
All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS). The proceedings will be available via the SpringerLink digital library. The volumes of this series are submitted for inclusion to the leading indexing services including DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.15
The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications.
The topics of interests include, but are not limited to:
Anti-Forensics TechniquesApplication SecurityAuthentication and Access Control SystemsCritical Infrastructure ProtectionCyber Warfare Trends and ApproachesDenial-of-Service Attacks and CountermeasuresDigital ForensicsDigital Rights ManagementDistributed and Pervasive Systems SecurityEmbedded Systems SecurityEnterprise Systems SecurityExecutable Content and Content FilteringFile and Files System SecurityFraud ManagementHardware SecurityHuman-Computer Interaction and SecurityIdentity ManagementIntellectual Property ProtectionKey Distribution and ManagementMobile System SecurityMultimedia and Document SecurityNetwork Infrastructure SecurityOperating Systems and Database SecurityPeer-to-Peer SecuritySecure Communications and Information FlowSecure Sensor NetworksSecurity for Grid ComputingSecurity in Cloud Computing/Social NetworksSecurity in e-servicesSecurity of Web-Based ApplicationsSurveillance SystemsAccountabilityAnonymityAnalysis of Network and Security ProtocolsAuthorship AnalysisBiometrics Standards and StandardizationBorder SecurityBusiness Continuity & Disaster Recovery PlanningCrowd ManagementEmergency Response and ManagementEncryption and CryptographyForecasting TerrorismIncident Handling and Penetration TestingInformation HidingIntrusion and Anomaly Detection and PreventionInvestigation of Insider AttacksLanguage-Based SecurityMalware Forensics and Anti-Malware TechniquesProtocol SecuritySecure Software DevelopmentSecurity ArchitecturesSecurity MetricsSelf-Protecting and Self-Healing SystemsSocial EngineeringSocial Network AnalysisTemplate Protection and Liveliness DetectionThreats, Vulnerabilities, and Risk ManagementEconomics of SecurityLaws and Regulations/Legal IssuesSecurity Policies and Trust ManagementSecurity Education and TrainingNew Threats and Non-Traditional ApproachesTheories, Methods and Tools in Managing Security
Special Session on Cloud Security and Cryptography--------------------------------------------------Accountability for Cloud ComputingAvailability, Recovery and AuditingCloud Access Control and Key ManagementCloud-Centric Threat ModelsCoding and Cryptography for Secure CloudParallel and Dynamic Searchable Symmetric EncryptionAttribute-Based EncryptionMulti-Party Computation with Low CommunicationHomomorphic EncryptionCryptographic Cloud StorageRandomness Testing of Modern Encryption TechniquesEvolution of Cloud Security MeasuresFailure Detection and PredictionCloud ForensicsIdentity Management in the CloudIntegrity and Verifiable ComputationPrivacy Preserving Technologies in Cloud ComputingProofs of StorageRemote Attestation Mechanisms in CloudsScalability of Security in Global-Size CloudsSecure Cloud ArchitectureSecure Computation OutsourcingSecure Data ManagementSecure Management of Virtualized ResourcesSecure Mobile CloudSecurity for Emerging Cloud Programming ModelsSecured Searching in Cloud DataTrust and Policy Management in CloudsContinuous Security MonitoringNew Cloud-Aware Web Service Security Paradigms and MechanismsBusiness and Security Risk Models and CloudsCase Studies and Experimental Implementations
Important Dates----------------Full Paper Submission Ends: April 30, 2016Acceptance Notification: June 30, 2016Final Paper Deadline: July 31, 2016
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openmath.org/pipermail/om-announce/attachments/20160319/403bb45f/attachment-0001.html>
More information about the Om-announce
mailing list