posted by user: bartdd || 13156 views || tracked by 10 users: [display]

CMS 2012 : Communications and Multimedia Security

FacebookTwitterLinkedInGoogle


Conference Series : Communications and Multimedia Security
 
Link: http://sec.cs.kent.ac.uk/cms2012
 
When Sep 3, 2012 - Sep 5, 2012
Where Canterbury, UK
Submission Deadline Apr 12, 2012
Notification Due May 6, 2012
Final Version Due Jun 6, 2012
Categories    cryptography   biometrics   watermarking   privacy
 

Call For Papers

13th Joint IFIP TC6 and TC11 Conference on
Communications and Multimedia Security -- CMS'2012
September 3-5, 2012, Canterbury, UK

CMS'2012 is the 13th Conference in the “Communications and Multimedia Security" series. The series is a joint effort of IFIP Technical Committees TC6 (Communication Systems) and TC11 (Security and Protection in Information Processing Systems).
The conference provides a forum for engineers and scientists in information security. Both state-of-the-art issues and practical experiences as well as new trends in these areas will be once more the focus of interest just like at preceding conferences.
The conference will address in particular security and privacy issues in mobile contexts, web services (including social networking) and ubiquitous environments.
We solicit papers describing original ideas and research results on topics that include, but are not limited to:
- applied cryptography
- biometrics
- secure documents and archives
- multimedia systems security
- digital watermarking
- distributed DRM policies
- attack resistant rendering engines
- adaptive anomaly detection
- censorship resistance
- risk management
- mobility and security/privacy
- mobile identities
- privacy enhanced identity management
- security/privacy policies and preferences
- social networks security/privacy
- security/privacy in geo-localized applications
- security/privacy in VoIP`
- security policies (including usage control)
- web services security
- economics of network and information security (NIS)
- SOA security
- ubiquitous and ambient computing security
- cloud computing security/privacy
- wireless and ad hoc network security
- RFID tags and (multimedia) sensor nodes security
- security technology effectiveness
- incentivizing security

Instructions for authors:

The conference will comprise two refereed paper tracks: the Research track and the Industry/Government/Work-in-progress track, as well as a poster session, all of them being presented in a single stream.

Paper submissions for the Research track must be written in English, formatted in the conference style (limited to 14 pages, see the conference web site for a style template and submission instructions). The paper must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Authors are requested to submit original papers only. Papers that have previously been published and papers that are currently being considered for publication by another journal or conference are not eligible.
Each paper must include a short abstract and a list of keywords indicating subject classification. Its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader.

Paper submissions for the Industry/Government/Work-in-progress track are limited to 8 pages (see also conference website for the instructions). These papers highlight applications or present work-in-progress. They should also address challenges, lessons learned or research issues arising out of –both successful and unsuccessful- deployment of such applications. Note, however, that sufficient technical content is required.

For Poster submissions, a title and an abstract (max 2 pages) is required. Accepted posters will be published in the proceedings as extended abstracts.

All submitted papers will be refereed by members of the Programme Committee for correctness, originality, relevance to the conference and quality of presentation. Acceptance of a paper or poster means an obligation for at least one of the authors to attend the conference and present the paper or poster.

Google has again agreed to sponsor a number of travel grants for students, and prizes for best papers.

The proceedings will be published by Springer.

To submit a paper or a poster, visit the conference web site.
Important dates:
Paper/poster submission: 1 Apr 2012

Acceptance notification: 6 May 2012

Camera-ready papers due: 31 May 2012

Conference: 3-5 Sep 2012

Conference Web site:
http://sec.cs.kent.ac.uk/cms2012/

Programme Chair:
David W. Chadwick, University of Kent, UK
Bart De Decker, K.U.Leuven, Belgium

Programme Committee:
Anas Abou El Kalam, IRIT - INP, France
Patrick Bas, CNRS - Laboratoire d'Automatique, Génie Informatique et Signal, France
Howard Chivers, Cranfield University, UK
Isabelle Chrisment, LORIA-University of Nancy, France
Gabriela Ciocarlie, SRI International Computer Science Lab, USA
Frédéric Cuppens, Télécom Bretagne, France
Hervé Debar, Télécom SudParis, France
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Lieven Desmet, KULeuven, Belgium
Lieven De Strycker, Katholieke Hogeschool Sint-Lieven, Belgium
Jana Dittmann, University of Magdeburg, Germany
Stelios Dritsas, Athens University of Economics and Business, Greece
Gerhard Eschelbeck, Sophos, USA
Simone Fischer-Hübner, Karlstad University, Sweden
Jürgen Fuß, University of Applied Sciences Upper Austria, Hagenberg, Austria
Teddy Furon, INRIA Rennes - Bretagne Atlantique, France
Sébastien Gambs, Université de Rennes 1 - INRIA / IRISA, France
Christian Geuer-Pollmann, Microsoft Research, Germany
Dieter Gollmann, Hamburg University of Technology, Germany
Rüdiger Grimm, University of Koblenz, Germany
Jean Hennebert, University of Applied Sciences, HES-SO, Switzerland
Eckehard Hermann, University of Applied Sciences Upper Austria, Hagenberg, Austria
Jaap-Henk Hoepman, TNO / Radboud University Nijmegen, The Netherlands
Andreas Humm, University of Fribourg, Switzerland
Edward Humphreys, XiSEC, UK
Christophe Huyghens, K.U.Leuven, Belgium
Witold Jacak, University of Applied Sciences Upper Austria, Hagenberg, Austria
Sushil Jajodia, George Mason University, USA
Lech Janczewski, University of Auckland, Auckland, New Zealand
Günter Karjoth, IBM Research - Zurich, Switzerland
Stefan Katzenbeisser, TU Darmstadt, Germany
Markulf Kohlweiss, Microsoft Research Cambridge, UK
Romain Laborde, Institut de Recherche en Informatique de Toulouse (IRIT), France
Jorn Lapon, Katholieke Hogeschool Sint-Lieven, Belgium
Herbert Leitold, Secure Information Technology Center (A-SIT), Austria
Javier Lopez, University of Malaga, Spain
Louis Marinos, European Network and Information Security Agency (ENISA), Greece
Keith Martin, Royal Holloway, University of London, UK
Chris Mitchell, Royal Holloway, University of London, UK
Refik Molva, Eurécom, France
Jörg Mühlbacher, Johannes Kepler Universität Linz, Austria
Yuko Murayama, Iwate Prefectural University, Japan
Vincent Naessens, Katholieke Hogeschool Sint-Lieven, Belgium
Peter Neumann, Computer Science Lab, SRI International, USA
Nick Nikiforakis, KU Leuven, Belgium
Chandrasekaran Pandurangan, Indian Institute of Technology, Madras, India
Günther Pernu, University of Regensburg, Germany
Alessandro Piva, University of Florence, Italy
Bart Preneel, K.U.Leuven, Belgium
Jean-Jacques Quisquater, Université catholique de Louvain, Belgium
Kai Rannenberg, Goethe University Frankfurt, Germany
Vincent Rijmen, KU Leuven, Belgium and Graz University of Technology, Austria
Pierangela Samarati, Università degli Studi di Milano, Italy
Riccardo Scandariato, KU Leuven, Belgium
Ingrid Schaumüller-Bichl, University of Applied Sciences Upper Austria, Hagenberg, Austria
Jörg Schwenk, Ruhr-Universität Bochum, Germany
Einar Snekkenes, Gjovik University College, Norway
Andreas Uhl, University of Salzburg, Austria
Umut Uludag, Scientific and Technological Research Council (TÜBITAK), Turkey
Vijay Varadharajan, Macquarie University, Australia
Pedro Veiga, University of Lisbon, Portugal
Tatjana Welzer, University of Maribor, Slovenia
Claus Vielhauer, University of Magdeburg, Germany
Andreas Westfeld, University of Applied Sciences, Dresden, Germany
Ted Wobber, Microsoft Research Silicon Valley, USA
Shouhuai Xu, University of Texas at San Antonio, USA
Moti Yung, Google & Columbia University, USA
Gansen Zhao, South China Normal University, China

Conference Chair:
Bart De Decker, KU Leuven, Belgium

Organising Chair:
David W. Chadwick, University of Kent, UK
d.w.chadwick@kent.ac.uk

Related Resources

SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
IJCIS 2024   International Journal on Cryptography and Information Security
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
SEAS 2025   14th International Conference on Software Engineering and Applications
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)