posted by user: kotzgroup || 35145 views || tracked by 76 users: [display]

NDSS 2016 : Network and Distributed System Security Symposium

FacebookTwitterLinkedInGoogle


Conference Series : Network and Distributed System Security Symposium
 
Link: http://www.internetsociety.org/events/ndss-symposium-2016
 
When Feb 21, 2016 - Feb 24, 2016
Where San Diego
Abstract Registration Due Aug 14, 2015
Submission Deadline Aug 18, 2015
Notification Due Sep 18, 2015
Final Version Due Oct 22, 2015
Categories    network   security   distributed systems   internet
 

Call For Papers

ISOC NDSS fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Technical papers and panel proposals are solicited. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2016. The Proceedings will be made freely accessible from the Internet Society webpages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

Technical Papers

Paper Formatting
Technical papers submitted for NDSS should be written in English. Papers must not exceed 15 pages in total (including the references and appendices). Papers must be formatted for US letter size (not A4) paper in a two-column layout, with columns no more than 9.25 in. high and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors must use the NDSS templates, which can be found here: http://www.internetsociety.org/events/ndss-symposium/ndss-templates. Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Documents should render correctly in Adobe Reader when printed in black and white.

Double and Concurrent Submissions
Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. Double-submission will result in immediate rejection. The Program Committee may share information with other conference chairs and journal editors so as to detect such cases.

Ethical Considerations
If a paper relates to human subjects, analyzes data derived from human subjects, may put humans at risk or might have other ethical or legal implications, authors should disclose if an ethics review (e.g., IRB approval) was conducted, and discuss in the paper how ethical and legal concerns were addressed. If the paper reports a potentially high-impact vulnerability the authors should discuss their plan for responsible disclosure. The chairs will contact the authors in case of major concerns. The Program Committee reserves the right to reject a submission if insufficient evidence was presented that ethical and legal concerns were appropriately addressed.

Anonymous Submissions
NDSS implements a double-blind reviewing process. Author names and affiliations should not appear in the paper. The authors should make a reasonable effort not to reveal their identities or institutional affiliation in the text, figures, photos, links, or other data that is contained in the paper. Authors’ prior work should be preferably referred to in the third person; if this is not feasible, the references should be blinded. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs.

Conflicts of Interest
Authors and Program Committee members are required to indicate any conflict of interest and its nature. Advisors and advisees, as well as authors and PC members with an institutional relationship are considered to share a conflict of interest. Professional collaborations (irrespective of whether they resulted in a publication) that occurred in the past 3 years and close personal relationships equally constitute a conflict of interest. PC members, including chairs that have a conflict of interest with a paper, will be entirely excluded from the evaluation of that paper. The PC chair and shadow chair are not allowed to submit to the conference. Declaring conflicts of interest in order to prevent submissions from being reviewed by selected PC members is not allowed and can constitute grounds for rejection. If authors have concerns about the fair treatment of their submissions, they should instead contact the chairs and provide convincing arguments for any special consideration that they are requesting.

Early Rejection Notification
The review process will consist of several reviewing rounds. In order to allow authors time to improve their work and submit to other venues, authors of submissions for which there is a consensus on rejection will be notified earlier (by 18 September 2015).

Papers that are not accepted as full technical papers may be invited by the Program Committee to be presented at the conference as short talks. Extended abstracts of such papers will appear on the Internet Society website but not in the proceedings. Priority will be given to papers that have fresh, unconventional ideas.

Panel Proposals

Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear on the Internet Society website but not in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists.

Submission Site and Contact

Submissions of papers and panels: https://ndss16.syssec.ch/
PC chair contact: pc-chair@isoc.org

Areas of Interest

Submissions are solicited in, but not limited to, the following areas:
Anti-malware techniques: detection, analysis, and prevention
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Security for future Internet architectures and designs (e.g., Software-Defined Networking)
High-availability wired and wireless networks
Implementation, deployment and management of network security policies
Integrating security in Internet protocols: routing, naming, network management
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Intrusion prevention, detection, and response
Privacy and anonymity technologies
Security and privacy for distributed cryptocurrencies
Security and privacy in Social Networks
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Security for cloud computing
Security for emerging technologies: sensor/wireless/mobile/personal networks and systems
Security for future home networks, Internet of Things, body-area networks
Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)
Security for peer-to-peer and overlay network systems
Security for Vehicular Ad-hoc Networks (VANETs)
Security of Web-based applications and services
Trustworthy Computing mechanisms to secure network protocols and distributed systems
Usable security and privacy

Program Committee

Manos Antonakakis, Georgia Institute of Technology
Davide Balzarotti, EURECOM
Lujo Bauer, Carnegie Mellon University
Joseph Bonneau, Stanford University & EFF
Nikita Borisov, University of Illinois at Urbana-Champaign
Kevin Butler, University of Florida
Srdjan Capkun, ETH Zurich (Chair)
Nicolas Christin, Carnegie Mellon University
Emiliano De Cristofaro, University College London
William Enck, North Carolina State University
Manuel Egele, Boston University
Guofei Gu, Texas A&M University
Thorsten Holz, Ruhr-University Bochum
Somesh Jha, University of Wisconsin Madison
Ari Juels, Cornell Tech (Shadow Chair)
Jonathan Katz, University of Maryland
Yongdae Kim, KAIST
Engin Kirda, Northeastern University
Farinaz Koushanfar, Rice University
Christopher Kruegel, University of California, Santa Barbara
Wenke Lee, Georgia Institute of Technology
Zhenkai Liang, National University of Singapore
David Lie, University of Toronto
Ben Livshits, Microsoft Research
Ivan Martinovic, Oxford University
Prateek Mittal, Princeton University
David Molnar, Microsoft Research
Cristina Nita-Rotaru, Purdue University
Alina Oprea, RSA Laboratories
Adrian Perrig, ETH Zurich
Christina Poepper, Ruhr University Bochum
Mike Reiter, UNC Chapel Hill
Thomas Ristenpart, Cornell Tech
Franziska Roesner, University of Washington
Andrei Sabelfeld, Chalmers University
Ahmad-Reza Sadeghi, TU Darmstadt
Reza Shokri, University of Texas at Austin
Robin Sommer, International Computer Science Institute, Berkeley
Patrick Traynor, University of Florida
Venkat Venkatakrishnan, University of Illinois, Chicago
Giovanni Vigna, UC Santa Barbara
David Wagner, University of California, Berkeley
XiaoFeng Wang, Indiana University Bloomington

NDSS’16 Steering Group

Michael Bailey, University of Illinois, Urbana-Champaign
David Balenson, SRI International
Davide Balzarotti, EURECOM
Lujo Bauer, Carnegie Mellon University (General Chair)
Srdjan Capkun, ETH Zurich
Deb Frincke, National Security Agency
Tom Hutton, University of California San Diego
Yongdae Kim, KAIST
Karen O’Donoghue, Internet Society
Deborah Shands, Aerospace Corporation
Matthew Smith, Rheinische Friedrich-Wilhelms-Universität Bonn
Paul Syverson, National Research Labs
Doug Szajda, University of Richmond
Helen Wang, Microsoft Research

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
QRS 2025   The 25th International Conference on Software Quality, Reliability, and Security
BDBS 2025   6th International Conference on Big Data, Blockchain and Security
DBSec 2025   Conference on Data and Applications Security and Privacy
BRAIN 2025   6th Workshop on Blockchain theoRy and ApplicatIoNs BRAIN 2025