[Tccc] [IEEE CNOM] [GC'08 CCNS] TPC request for CFP distribution (fwd)
---------- Forwarded message ---------- Date: Mon, 17 Dec 2007 13:30:14 -0500 From: gc2008ccns@yahoo.com To: Carlos Becker Westphall westphal@lrg.ufsc.br Cc: gc2008ccns@yahoo.com Subject: [GC'08 CCNS] [GC'08 CCNS] TPC request for CFP distribution
Dear Prof. Carlos Becker Westphall,
We cordially invite you for the distribution of our Call for Papers for the Computer and Communications Network Security symposium (CCNS) at Globecom 2008. Below, you may find a text version of the call. If you require a Words .doc or a pdf formatted version, please get in contact with us.
With best regards,
Co-chairs of the Globecom 2008 CCNS Abderrahim BENSLIMANE, abderrahim.benslimane@univ-avignon.fr Jiankun HU, Australia, jiankun@cs.rmit.edu.au Peter MUELLER, pmu@zurich.ibm.com
*******************************************************************************
IEEE GLOBECOM 2008 ================== IEEE Communications Society 30. November - 4. December 2008 New Orleans, LA, USA http://www.IEEE-Globecom.org/2008
**** CALL FOR PAPERS - TECHNICAL SYMPOSIA ****
Computer and Communications Network Security Symposium ====================================================== http://www.comsoc.org/confs/globecom/2008/symposium/compcom.html
Symposia Co-Chairs: - Abderrahim Benslimane, LIA/CERI, abderrahim.benslimane@univ-avignon.fr - Jiankun Hu, RMIT University, jiankun@cs.rmit.edu.au - Peter Mueller, IBM Zurich Research Laboratory, pmu@zurich.ibm.com
With the advent of pervasive computer applications and due to the proliferation of heterogeneous wired and wireless computer networks, computer and network security has become paramount. The Computer and Communications Network Security Symposium will address all aspects of the modelling, design, implementation, deployment, and management of computer/network security algorithms, protocols, architectures, and systems. Furthermore, contributions devoted to the evaluation, optimization, or enhancement of security mechanisms for current technologies as well as devising efficient security and privacy solutions for emerging technologies are solicited. Original papers are invited in the area of computer and network security. Papers must represent high-quality and previously unpublished work. Contributions in CCNS symposium target wired networks as well as wireless networks: 3G/ 4G, Satellite, IEEE 802.11, Bluetooth, Ad Hoc, Vehicular, Sensor and RFID Networks, WiMAX, 802.16, 802.16e and Peer-to-Peer Systems.
Topics of interest: - Secure PHY, MAC, Routing and Upper Layer Protocols - Secure Cross Layer Design - Authentication Protocols and Services Authorization - Confidentiality - Data and System Integrity - Availability of Secure Services - Key Distribution and Management - PKI and Security Management - Trust Models and Trust Establishment - Identity Management and Access Control - Deployment and Management of Computer/Network Security Policies - Monitoring Design for Security - Distributed Intrusion Detection Systems and Countermeasures - Traffic Filtering and Firewalling - IPv6 security, IPSec - Virtual Private Networks (VPNs) - Prevention, Detection and Reaction Design - Revocation of Malicious Parties - Light-Weight Cryptography - Quantum Cryptography and QKD - Applications of Cryptography and Cryptanalysis in communications security - Security and Mobility - Mobile Code Security - Network traffic Analysis Techniques - Secure Naming and Addressing (Privacy and Anonymity) - Application/Network Penetration Testing - Advanced Cryptographic Testbeds - Network Security Metrics and Performance Evaluation - Operating System(OS) Security and Log Analysis Tools - Security Modelling and Protocol Design - Security Specification Techniques - Self-Healing Networks - Smart Cards and Secure Hardware - Biometric Security: Technologies, Risks and Vulnerabilities - Information Hiding and Watermarking - Vulnerability, Exploitation Tools, and Virus/Worm Analysis - Distributed Denial-Of-Service (DDOS) Attacks and Countermeasures - DNS Spoofing and Security - Critical infrastructure Security - Single- and Multi-Source Intrusion Detection and Response (Automation) - Web, E-commerce, M-commerce, and E-mail Security - New Design for Unknown Attacks Detection
Important dates: - Paper Submission: 15 March 2008 - Notification: 28 June 2008 - Camera-Ready: 15 August 2008
*******************************************************************************
_______________________________________________ cnom mailing list cnom@inf.ufsc.br http://listas.inf.ufsc.br/mailman/listinfo/cnom _______________________________________________ Tccc mailing list Tccc@lists.cs.columbia.edu https://lists.cs.columbia.edu/cucslists/listinfo/tccc
participants (1)
-
Carlos Becker Westphall