| |||||||||||||||
CSS 2014 : 3rd International Conference on Cryptography and Security Systems | |||||||||||||||
Link: http://www.css.umcs.lublin.pl | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
In recent years, computer applications and Internet services have been contributing extensively to our life experience and, simultaneously, they are vulnerable and undergo permanent attacks. The objective of the Cryptography and Security System Conference is to present research and developing activities original unpublished results related to all aspects of cryptography and network security. We invite both theoretical, applied research papers, case studies, implementation experiences as well as work-in-progress presentations.
The Full Papers accepted after peer review will be published in Springer: Communications in Computer and Information Sciences. The short and work in progess papers accepted after peer review will be published in Special Issue of Journal - Annales UMCS ser. Informatica. Program Committee Pascal Bouvry (University of Luxembourg) Nicolas T. Courtois (University College London) Stefan Dziembowski (University of Warsaw, University of Rome) Krzysztof Gaj (George Mason University) Piotr Gajewski (Military University of Technology) Janusz Górski (Gdańsk University of Technology) Jaime Gutierrez (University of Cantabria) Pascal Lafourcade (LIMOS, Univ. d'Auvergne, Univ. Blaise Pascal) Franck Leprévost (University of Luxembourg) Marek Klonowski (Wrocław Univeristy of Technology) Zbigniew Kotulski - Chair (Warsaw University of Technology) Mieczysław Kula (University of Silesia) Marek Ogiela (AGH University of Science and Technology) Björn Ottersten (University of Luxembourg) Josef Pieprzyk (Macquarie University) Jacek Pomykała (University of Warsaw) Peter Ryan (University of Luxembourg) Franciszek Seredyński (Cardinal Stefan Wyszynski University) Janusz Stokłosa (Poznań University of Technology) Vasyl Ustimenko (Maria Curie-Sklodowska University) Topics: The main topics of interest include, but are not limited to: network security cryptography and data protection peer-to-peer security wireless networks security security of sensor networks heterogeneous networks security privacy-enhancing methods covert channels steganography and watermarking for security applications security of webservices cryptographic protocols security as quality of service, quality of protection data and application security, software security security models, evaluation, and verification formal methods in security trust and reputation models reputation systems for security applications intrusion tolerance system surveillance and enhanced security cybercrime: threats and countermeasures Legal constraints of security systems Risk analysis and management Important dates : Full Papers April 6, 2014 - Full Paper submission deadlineFull Papers April 6, 2014 - Full Paper submission deadline (strictc) May 18, 2014 - Notification of Full Papers June 1, 2014 - Final camera-ready, payment and registration for Full Papers Short and work in progress papers May 25, 2014 - Short and work in progress papers submission deadline (strict) June 15, 2014 - Notification of Short and work in progress papers June 29, 2014 - Final camera-ready, payment and registration for Short and work in progress papers September 22-24, 2014 - Conference Contact: Bogdan Ksiezopolski bogdan.ksiezopolski(at)acm.org |
|