CISSS 2012 - Communications and Information Systems Security Symposium
View: 2370
Website |
Edit Freely
Category CISSS 2012
Deadline: March 15, 2012 | Date: December 03, 2012-December 07, 2012
Venue/Country: Anaheim, U.S.A
Updated: 2012-03-13 19:17:57 (GMT+9)
Call For Papers - CFP
Communications and Information Systems Security Symposium at GlobeCom 2012http://www.ieee-globecom.org/2012/3-7 December 2012Anaheim, CA, USAScope and Motivation:With the advent of tomorrow’s global connectivity of resources and contents,all aspects of security, privacy, anonymity and trust have become a vitalissue to any institution as well as individuals. The Symposium onCommunication and Information Systems Security (CIS) welcomes manuscripts onnew aspects, from theory to implementation and operation, which address theseissues. Furthermore, also contributions devoted to the evaluation,optimization, or enhancement of security and privacy mechanisms for currenttechnologies and applications, as well as efficient security and privacy solutions for emerging areas from physical layer technology to the applicationlayer, are solicited.Submitted manuscripts should represent high-quality and previously unpublishedwork and may not be submitted in parallel to other conferences or journals.Main Topics of Interest:- Anonymity, anonymous communication, measures and performance analysis- Authentication protocols and message authentication- Availability of secure services and systems- Biometric security: technologies, risks, vulnerabilities, bio-cryptography,mobile template protection- Botnets prevention, detection and defense- Cloud and distributed application security- Computer and network forensics- DDOS attacks, DNS spoofing, intrusion, localization and countermeasures- Digital behavior management- Digital right management: information hiding, watermarking, fingerprinting,and traitor tracing scheme- Firewall technologies- Formal trust models, security modeling and protocol design- Identity management- Information systems security and security management- Integrity- Lightweight security- Mobile and Wireless network security, including ad hoc networks, P2P networks,3G, 4G, sensor networks, Bluetooth, 802.11 family and WiMAX- Multi-mode surveillance and homeland security- Network public opinion analysis and monitoring- Network security metrics and performance- Operating systems and application security and analysis tools- Optical network security- Physical security and hardware/software security- Privacy and privacy enhancing technologies- Public-key, symmetric-key, applied crypto, coding-based cryptography- Quantum cryptography- Security in virtual machine environments- Security in wired systems- Social engineering- Traffic accountability- Trust management and certificate handling- Virtual private networks and group security- VoIP, IPTV, DAB, and other multimedia security- Vulnerability, exploitation tools and virus analysis- Web, eBusiness, eCommerce, eGovernment securityImportant Dates:- Paper Submission: 15 March 2012- Paper Acceptance: 1 July 2012- Camera-Ready: 1 August 2012- Conference: 3-7 December 2012Submission Site:http://edas.info/newPaper.php?c=11333Email:gc12cissyahoo.comSymposium Co-Chairs:Wenjing Lou - Virginia Polytechnic Institute and State University, USAPeter Mueller - IBM Zurich Research Laboratory, SwitzerlandShiguo Lian - France Telecom R&D, China
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.