Fwd: IEEE CNS'15 Paper Submission Deadline extended to 4 May
-------- Weitergeleitete Nachricht -------- Betreff: IEEE CNS'15 Paper Submission Deadline extended to 4 May Datum: Fri, 24 Apr 2015 10:18:39 -0400 Von: IEEE ComSoc Meetings noreply@comsoc.org An: wolf@ibr.cs.tu-bs.de
View message online - Click here http://www.mmsend10.com/link.cfm?r=248908789&sid=73545082&m=9940120&u=IEEECOMSOC&j=27328436&s=http://www.magnetmail.net/actions/email_web_version.cfm?recipient_id=248908789&message_id=9940120&user_id=IEEECOMSOC&group_id=1116109&jobid=27328436.
*-- Paper Submission Deadline extended to 4 May 2015 -- http://www.mmsend10.com/link.cfm?r=248908789&sid=73545084&m=9940120&u=IEEECOMSOC&j=27328436&s=http://cns2015.ieee-cns.org/call-for-papers*
* The 2015 IEEE Conference on Communications and Network Security (CNS) http://www.mmsend10.com/link.cfm?r=248908789&sid=73545085&m=9940120&u=IEEECOMSOC&j=27328436&s=http://cns2015.ieee-cns.org/*seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, all the way from the physical layer to the various network layers to the variety of applications reliant on a secure communication substrate. Submissions with main contribution in other areas, such as information security, software security, system security, or applied cryptography, will also be considered if a clear connection to secure communications/networking is demonstrated.
Particular topics of interest include, but are not limited to: -Anonymization and privacy in communication systems -Biometric authentication and identity management -Computer and network forensics -Data and application security -Data protection and integrity -Availability of communications, survivability of networks in the presence of attacks -Key management and PKI for networks -Information-theoretic security -Intrusion detection and prevention -Location privacy -Mobile security -Outsourcing of network and data communication services -Physical layer security methods, cross-layer methods for enhancing security -Secure routing, network management -Security for critical infrastructures -Security metrics and performance evaluation -Security and privacy for big data -Security and privacy in body area networks -Security and privacy in content delivery network -Security and privacy in cloud computing and federated cloud -Security and privacy in crowdsourcing -Security and privacy in the Internet of Things -Security and privacy in multihop wireless networks: ad hoc, mesh, sensor, vehicular and RFID networks -Security and privacy in peer-to-peer networks and overlay networks -Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max -Security and privacy in smart grid, cognitive radio networks, and disruption/delay tolerant networks -Security and privacy in social networks -Security and privacy in pervasive and ubiquitous computing -Social, economic and policy issues of trust, security and privacy -Traffic analysis -Usable security for networked computer systems -Vulnerability, exploitation tools, malware, botnet, DDoS attacks -Web, e-commerce, m-commerce, and e-mail security * Paper submissions are NOW due 4 May 2015.* * For requirements and submission instruction, visit **http://cns2015.ieee-cns.org/content/submission-instructions-0* http://www.mmsend10.com/link.cfm?r=248908789&sid=73545086&m=9940120&u=IEEECOMSOC&j=27328436&s=http://cns2015.ieee-cns.org/content/submission-instructions-0*.*
**
IEEE Communications Society - 17th floor , 3 Park Avenue, New York, NY 10016
participants (1)
-
Lars Wolf