Communication and Information Systems Security Symposium

Symposium Co-Chairs

Dr. Wenjing Lou
Worcester Polytechnic Institute,
USA
Email: wjlou@ece.wpi.edu 

Dr. Pramode K Verma
University of Oklahoma,
USA
Email: pverma@ou.edu 

Dr. Abderrahim Benslimane
Uinversity of Avignon,
France,
Email: abderrahim.benslimane@univ-avignon.fr

 

Scope and Motivation

IEEE ICC 2010, with the theme “Communications: Accelerating Growth and Development”, will feature a Communication and Information System Security (CISS) Symposium. The CISS symposium aims at providing a forum for sharing ideas among researchers and practitioners working on state-of-the-art solutions to security and privacy issues in communications and information systems. We are seeking papers that describe original and unpublished contributions. You are invited to submit original technical papers covering but not limited to the following topics.

Topics of Interest

  1. Ad hoc and mesh network security
  2. Access control
  3. Accounting and auditing
  4. Anonymization and privacy in communication networks
  5. Applied cryptography
  6. Authentication
  7. Computer and network forensics
  8. Critical infrastructure security
  9. Cross-layer methods for enhancing security
  10. Data and application security
  11. Distributed Denial-Of-Service (DDOS) attacks and countermeasures
  12. Distributed systems security
  13. Information hiding and watermarking
  14. Internet security
  15. Intrusion detection, localization, and avoidance
  16. IPv6 security
  17. Key distribution and management
  18. Mobile code security
  19. Network security metrics and performance evaluation
  20. Network traffic analysis techniques
  21. Peer-to-peer system security
  22. Privacy-preserving techniques
  23. Security and privacy in social networks
  24. Security for RFID and SCADA Systems
  25. Security modeling and protocol design
  26. Security and privacy policies
  27. Self-healing networks
  28. Sensor network security
  29. Smart cards and secure hardware
  30. Trust models and trust management
  31. Vulnerability, exploitation tools, and virus/worm analysis
  32. Web, e-commerce, m-commerce, and e-mail security
  33. Wi-Fi, WiMAX security