[FM-India] ICC 2014 Security Symposium Deadline extended to September 30 (firm)

Madhavan Mukund madhavan at cmi.ac.in
Mon Sep 16 07:26:31 IST 2013

 From: Shui Yu <shuiyucfp at gmail.com>
 To: pmu at zurich.ibm.com
 Date: Mon, 16 Sep 2013 11:18:27 +1000
 Subject: ICC 2014 Security Symposium Deadline extended to September 30 (firm)
 IEEE International Conference on Communications
 IEEE ICC 2014
 Communications: The Centrepoint of Digital Economy
 10 - 14 June 2014, Sydney, Australia
 *Communications and Information Systems Security Symposium (CISS)*
 The 2014 IEEE International Conference on Communications (ICC) will
 be held in the beautiful city of Sydney, Australia between 10 and 14
 June 2014. The theme of this flagship conference of IEEE
 Communications Society for 2014 is “Communications: The Centrepoint
 of Digital Economy.” The conference will feature a comprehensive
 technical program including twelve Symposia and a number of Tutorials
 and Workshops. IEEE ICC 2014 will also include an attractive expo
 program including keynote speakers, and Industry Forum & Exhibitions
 (IF&E). We invite you to submit your original technical papers,
 industry forum, workshop, and tutorial proposals to this
 event. Accepted and presented papers will be published in the IEEE
 ICC 2014 Conference Proceedings and in IEEE Xplore®.  Full details of
 submission procedures are available at http://www.ieee-icc.org/2014.
 Scope and Topics of Interest:

 The Communications and Information Systems Security Symposium (CISS)
 will focus on all aspects of security, privacy, trust, and risk
 management, which pose a serious challenge to today's globally
 connected society. The symposium welcomes novel contributions on
 evaluation, modeling, analysis, and design of communication and
 information systems security solutions, from the physical layer to
 the application layer. In addition, this year’s CISS puts a stronger
 emphasis on network oriented security and privacy, such as security
 related topics of cloud computing, networking related security in Big
 Data, IoT, and so on.
 To ensure complete coverage of the advances in communication and
 information systems security, the topics of interest of the CISS
 include, but are not limited to, the following areas:

 - Anonymity, anonymous communication, metrics and their performance analysis
 - Authentication protocols and message authentication
 - Authorization and access control
 - Availability and survivability of secure services and systems
 - Big Data security and privacy
 - Biometric security
 - Botnet detection, prevention, and defense
 - Cloud and distributed application security
 - Computer and network forensics
 - Cryptography and evaluation
 - Data center security
 - Firewall technologies; intrusion detection, localization, and avoidance
 - Formal trust models, security modeling and protocol design
 - Key distribution and management
 - Lightweight security
 - Location-based services and their security and privacy aspects
 - Mobile and Wireless network security
 - Mobile App security and privacy
 - Multi-mode surveillance and homeland security
 - Network public opinion analysis and monitoring
 - Network security metrics and their performance evaluation
 - Operating systems and application security and analysis tools
 - Online Social Networks and their security aspects
 - Physical security and hardware/software security
 - Privacy and privacy enhancing technologies
 - Quantum cryptography and communication applications
 - Resource allocation, incentives, and game-theoretic approaches
 - Security in virtual machine environments
 - Security in wired systems and optical networks
 - Security of Cyber-physical systems
 - Security risk management
 - Trust models, management and certificate handling
 - Virtual private networks and group security
 - Vulnerability, exploitation tools and virus analysis
 - Web, e-commerce, and m-commerce security
 Submission Guidelines:
 Prospective authors are invited to submit original technical papers by the
 deadline 15 September 2013 for publication in the IEEE ICC 2014 Conference
 Proceedings and for oral or poster presentation(s). All submissions should
 be written in English with a maximum paper length of six (6) printed pages
 (10-point font) including figures without incurring additional page charges
 (a maximum of one additional page will be accepted, subject to over-length
 Standard IEEE Transactions templates for Microsoft Word or LaTeX formats
 found at
 Alternatively you can follow the sample instructions in template.pdf at
 Only PDF files will be accepted for the review process and all submissions
 must be done through EDAS at
 Important dates:
 Paper Submission:        30 September 2013 (firm deadline)
 Acceptance Notification: 12 January 2014
 Camera-Ready:            13 February 2014
 Symposium Co-Chairs:
 Peter Mueller, IBM Zurich Research, Switzerland, pmu [at] zurich.ibm.com
 Shui Yu, Deakin University, Australia, syu [at] deakin.edu.au
 Thorsten Strufe, TU Darmstadt, Germany, strufe [at] cs.tu-darmstadt.de.
 Shui YU, PhD, Senior Lecturer
 School of Information Technology, Deakin University,
 221 Burwood Highway, Burwood, VIC 3125,  Australia.
 Telephone:0061 3 9251 7744

More information about the FMIndia mailing list