Proposals
Papers addressing all aspects of security in information and networks
are being sought. Researchers and industrial practitioners working
on the following and related subjects are especially encouraged:
next generation network architectures, protocols, theory, systems and applications;
the development and the realization of cryptographic solutions, security schemes, new algorithms;
critical analysis of, and/or experimenting with, existing approaches;
secure information systems, especially distributed control and processing applications, and security in networks;
interoperability, service levels and quality issues in such systems;
information assurance, security, and public policy;
detection and prevention of cyber crimes such as fraud and phishing;
industrial experiences and challenges of the above.
Proposals of special session(s) of the conference, workshops, and tutorials on fundamental to advanced subjects covering
practical implementation aspects of security are welcome.
The themes of such proposals should be closely related to the conference topics.
All proposals for workshops, tutorials, and special sessions are expected at the conference e-mail
info (at) sinconf (dot) org.
Journal Special Issue(s)
The authors of selected papers will be invited to submit an extended version of their papers for possible publication in the following special issues:
- Concurrency and Computation: Practice and Experience (by Wiley).
The theme of the special issue is Trust and Security in Wireless Sensor Networks.
Further details are available here.
- Networking Science (by Springer-Verlag).
The theme of the special issue is Next Generation Network Architectures, Protocols, Theory, Systems and Applications .
Further details are available here.
Areas of Interest
Broad areas of interest in security theory, technology and applications
will include, but are not limited to, the following:
- Access control and intrusion detection
- Autonomous and adaptive security
- Computational intelligence techniques in security
- Computer network defense
- Cryptographic techniques and key management
- Industrial applications of security
- Information assurance
- Next generation network architectures
- Network security and protocols
- Security in information systems
- Security tools and development platforms
- Security ontology, models, protocols & policies
- Standards, guidelines and certification
- Security-aware software engineering
- Trust and privacy
Following is a non-exhaustive list of subtopics of interest:
- Agent & MAS security
- Authentication & authorization
- Availability and reliability
- Biometric security
- Cognitive radio networks
- Cryptographic hardware design
- Cryptography and cryptanalysis (symmetrical and
asymmetrical)
- Cyber crime
- Digital signature
- Executables security
- Formal verification for security
- Human factors in security
- Information security development processes
- Intrusion & fraud detection
- Malicious codes
- Mobile code and agent security
- Mobile VoIP
- Network management
- Privacy in service computing
- Privacy policies and security
- Quality of Service
- Scripts and languages
- Secure ontology-based systems
- Securing storage: SAN/NAS security
- Security and privacy in online social networks
- Semantics of security
- Side-channel attacks
- Signals & security
- Software security and testing
- Spam counter measures
- Steganography
- Vulnerability analysis
- Web security
- Wireless security