Conferences In Information Security

Conference Name 17th Annual Network & Distributed System Security Symposium
Venue San Diego, California
URL http://www.isoc.org/isoc/conferences/ndss/10/
Submission Deadline 11-Sep-10
Conference Date 28 February - 3 March 2010
Sponsership/Publisher
Aim/Scope/Research Area The Program Committee members are not required to read the appendices, so the paper should be intelligible without them. Technical papers will appear in the proceedings. Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists.

Submissions are solicited in, but not limited to, the following areas:
•Security of Web-based applications and services
•Anti-malware techniques: detection, analysis, and prevention
•Intrusion prevention, detection, and response
•Security for electronic voting
•Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
•Privacy and anonymity technologies
•Network perimeter controls: firewalls, packet filters, and application gateways
Internet Society ▪ 1775 Wiehle Avenue, Reston, VA 20190 USA ▪ Phone: 1.703.439.2120 Fax 1.703.326.9881 ▪ www.isoc.org
•Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
•Security for Vehicular Ad-hoc Networks (VANETs)
•Security for peer-to-peer and overlay network systems
•Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
•Implementation, deployment and management of network security policies
•Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
•Integrating security services with system and application security facilities and protocols
•Public key infrastructures, key management, certification, and revocation
•Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
•Security for collaborative applications: teleconferencing and video-conferencing
•Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
•Security for large-scale systems and critical infrastructures
•Integrating security in Internet protocols: routing, naming, network management

Back To Conferences List

Database Sections