Our Sponsors
Category NDSS 2013
Deadline: August 06, 2012 | Date: February 24, 2013-February 27, 2013
Venue/Country: San Diego, U.S.A
Updated: 2012-05-20 12:07:31 (GMT+9)
. Reviewing is double blind, and technical papers should thus be properly anonymized to conceal the authors' identities. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed after the acceptance decision is made unless approved by the Programme Committee. Some papers that cannot be accepted as full technical papers may be invited by the Programme Committee to be presented at the conference as short talks. Priority will be given to the papers that have fresh, unconventional ideas. Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists. Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white. Submissions are solicited in, but not limited to, the following areas: * Anti-malware techniques: detection, analysis, and prevention * Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques * Future Internet architecture and design * High-availability wired and wireless networks * Implementation, deployment and management of network security policies * Integrating security in Internet protocols: routing, naming, network management * Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management * Intrusion prevention, detection, and response * Privacy and anonymity technologies * Public key infrastructures, key management, certification, and revocation * Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost * Security for collaborative applications: teleconferencing and video-conferencing * Security for Cloud Computing * Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, & licensing * Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems * Security for future home networks, Internet of Things, body-area networks * Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid) * Security for peer-to-peer and overlay network systems * Security for Vehicular Ad-hoc Networks (VANETs) * Security of Web-based applications and services * Trustworthy Computing mechanisms to secure network protocols and distributed systems The deadline for full submissions, made electronically in PDF format, is 11:59 pm EDT, 6 August 2012. However, titles and abstracts of papers must be received by 11:59 pm EDT, 1 August 2012. Each submission will be acknowledged by email; if acknowledgement is not received within seven days, contact the Programme Chair. Authors and panelists will be notified of acceptance by 22 October 2012, and given instructions on how to prepare the camera-ready copy. Submission Site: http://www.easychair.org/conferences/?conf=ndss2013
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.