Tag: metrics

Feb 14

17th European Symposium on Research in Computer Security (ESORICS 2012) Pisa, Italy — September 10-12, 2012

CALL FOR PAPERS

******************************************************************************
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy — September 10-12, 2012
http://www.iit.cnr.it/esorics2012/
******************************************************************************

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities.  Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

– access control
– accountability
– ad hoc networks
– anonymity
– applied cryptography
– authentication
– biometrics
– database security
– data protection
– digital content protection
– digital forensic
– distributed systems security
– electronic payments
– embedded systems security
– inference control
– information hiding
– identity management
– information flow control
– integrity
– intrusion detection
– formal security methods
– language-based security
– network security
– phishing and spam prevention
– privacy
– risk analysis and management
– secure electronic voting
– security architectures
– security economics
– security metrics
– security models
– security and privacy in cloud scenarios
– security and privacy in complex systems
– security and privacy in location services
– security and privacy for mobile code
– security and privacy in pervasive/ubiquitous computing
– security and privacy policies
– security and privacy in social networks
– security and privacy in web services
– security verification
– software security
– steganography
– systems security
– trust models and management
– trustworthy user devices
– web security
– wireless security

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2012.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of March 31, 2012.
Authors of accepted papers must guarantee that their papers will be
presented at the conference.

IMPORTANT DATES
Paper submission due: March 31, 2012
Notification to authors: June 10, 2012
Camera ready due: June 20, 2012

GENERAL CHAIR
Fabio Martinelli
National Research Council – CNR, Italy

PROGRAM CHAIRS
Sara Foresti
Universita` degli Studi di Milano, Italy

Moti Yung
Google Inc.,  USA

PUBLICITY CHAIR
Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Alessandro Armando, Universita` di Genova, Italy
Mikhail Atallah, Purdue University, USA
Michael Backes, Saarland University, Germany
David A. Basin, ETH Zurich, Switzerland
Kevin Bauer, University of Waterloo, Canada
Joachim Biskup, University of Dortmund, Germany
Marina Blanton, University of Notre Dame, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, HP Labs, UK
Seung-Geol Choi, University of Maryland, USA
Veronique Cortier, LORIA, France
Jason Crampton, University of London, UK
Frederic Cuppens, Telecom Bretagne, France
Anupam Datta, Carnegie Mellon University, USA
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Claudia Diaz, K.U. Leuven, Belgium
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Keith B. Frikken, Miami University, USA
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Ryan Henry, University of Waterloo, Canada
Amir Herzberg, Bar-Ilan University, Israel
Sushil Jajodia, George Mason University, USA
Aaron Johnson, U.S. Naval Research Lab, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
KwangJo Kim, KAIST, Korea
Markulf Kohlweiss, Microsoft Research, UK
Michiharu Kudo, IBM Tokyo Research Laboratory, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
John C. Mitchell, Stanford University, USA
Atsuko Miyaji, JAIST, Japan
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Jean-Jacques Quisquater, UCL, Belgium
Indrakshi Ray, Colorado State University, USA
Kui Ren, Illinois Institute of Technology, USA
Peter Ryan, University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
R. Sekar, Stony Brook University, USA
Elaine Shi, PARC/UC Berkley, USA
Einar Snekkenes, Gjovik University College, Norway
Abhinav Srivastava, AT&T Labs – Research, USA
Carmela Troncoso, K.U. Leuven, Belgium
Yevgeniy Vahlis, AT&T, USA
Jaideep Vaidya, Rutgers University, USA
Michael Waidner, TU Darmstadt, Germany
Shouhai Xu, University of Texas at San Antonio, USA
Ting Yu, North Carolina State University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at http://www.iit.cnr.it/esorics2012/

Feb 10

International Conference on Applied Cryptography and Network Security (ACNS 2012)

10th International Conference on
Applied Cryptography and Network Security (ACNS 2012)
Singapore, June 26-29, 2012
http://icsd.i2r.a-star.edu.sg/acns2012

Paper submission due: February 12, 2012 (11:59PM American Samoa time)

The 10th International Conference on Applied Cryptography and Network
Security (ACNS 2012) will be held in Singapore. The conference seeks
submissions from academia, industry, and government presenting novel
research on all aspects of applied cryptography as well as network
security and privacy. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged.
The conference has two tracks: a research track and an industry
track. Topics of interest include, but are not limited to:

– Access control
– Applied cryptography
– Automated  protocols analysis
– Biometric security and privacy
– Complex systems security
– Critical infrastructure protection
– Cryptographic primitives and protocols
– Data protection
– Database and system security
– Digital rights management
– Email and web security
– Identity management
– Intellectual property protection
– Internet fraud
– Intrusion detection and prevention
– Key management
– Malware
– Network security protocols
– Privacy, anonymity, and untraceability
– Privacy-enhancing technology
– Protection for the future Internet
– Secure mobile agents and mobile code
– Security in e-commerce
– Security in P2P systems
– Security in pervasive/ubiquitous computing
– Security and privacy in cloud and grid systems
– Security and privacy in distributed systems
– Security and privacy in smart grids
– Security and privacy in wireless networks
– Security and privacy metrics
– Trust management
– Usability and security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should
be at most 18 pages for research track and at most 8 pages for
industry track, including the bibliography and well-marked
appendices, and should follow the LNCS style. Submissions are
to be made to the submission web site at
http://www.easychair.org/account/signin.cgi?conf=acns2012.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 5, 2012
(11:59 p.m. Samoa time). Authors should indicate whether their
submission should be considered for the best student paper award;
any paper co-authored by at least a full time student is eligible.
Authors of accepted papers must guarantee that their papers will
be presented at the conference. Papers accepted for the research
track will be published in proceedings published by Springer’s LNCS
and available at the conference. Extended versions of selected best
papers will be invited for a special issue on the Journal of
Computer Security.

IMPORTANT DATES
Paper submission due: February 5, 2012 (11:59PM American Samoa time)
Notification to authors: April 10, 2012
Camera ready due: April 24, 2012

GENERAL CHAIR
Jianying Zhou
I2R, Singapore

PROGRAM CHAIRS
Feng Bao
I2R, Singapore

Pierangela Samarati
Universita` degli Studi di Milano, Italy

ORGANIZING CHAIR
Shen-Tat Goh
I2R, Singapore

PUBLICITY CHAIRS
Xinyi Huang
I2R, Singapore

Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Michel Abdalla      (ENS, France)
Vijay Atluri        (Rutgers University, USA)
Lucas Ballard       (Google, USA)
Paulo Barreto       (University of Sao Paulo, Brazil)
Lujo Bauer          (Carnegie Mellon University, USA)
Marina Blanton      (University of Notre Dame, USA)
Carlo Blundo        (Universita’ degli Studi di Salerno, Italy)
Levente Buttyan     (Budapest Uni of Technology and Economics, Hungary)
Roy Campbell        (University of Illinois at Urbana-Champaign, USA)
Liqun Chen          (HP Labs, UK)
Chen-Mou Cheng      (National Taiwan University, Taiwan)
Jung Hee Cheon      (Seoul National University, Korea)
Sherman S.M. Chow   (University of Waterloo, Canada)
Sabrina De Capitani di Vimercati (Universita’ degli Studi di Milano, Italy)
Robert Deng         (Singapore Management University, Singapore)
Roberto Di Pietro   (Universita’ di Roma Tre, Italy)
Xuhua Ding          (Singapore Management University, Singapore)
Kevin Du            (Syracuse University, USA)
Wu-Chang Feng       (Portland State University, USA)
Sara Foresti        (Universita’ degli Studi di Milano, Italy)
Keith Frikken       (Miami University, USA)
Rosario Gennaro     (IBM Research, USA)
Dieter Gollmann     (Hamburg University of Technology, Germany)
Stefanos Gritzalis  (University of the Aegean, Greece)
Dawu Gu             (Shanghai Jiaotong University, China)
Guofei Gu           (Texas A&M University, USA)
Sushil Jajodia      (George Mason University, USA)
Stanislaw Jarecki   (University of California Irvine, USA)
Aaron Johnson       (Naval Research Laboratory, USA)
Angelos Keromytis   (Columbia University, USA)
Steve Kremer        (INRIA Nancy, France)
Ralf Kuesters       (University of Trier, Germany)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Adam J. Lee         (University of Pittsburgh, USA)
Hui Li              (Xidian University, China)
Zhenkai Liang       (National University of Singapore, Singapore)
Benoit Libert       (Universite Catholique de Louvain, Belgium)
Peng Liu            (Penn State University, USA)
Michael Locasto     (University of Calgary, Canada)
Javier Lopez        (University of Malaga, Spain)
Mark Manulis        (TU Darmstadt, Germany)
Atsuko Miyaji       (JAIST, Japan)
Refik Molva         (EURECOM, France)
Yi Mu               (University of Wollongong, Australia)
Peng Ning           (North Carolina State University, USA)
Elisabeth Oswald    (University of Bristol, UK)
Vincent Rijmen      (Katholieke Universiteit Leuven, Belgium)
Matt Robshaw        (Orange Labs, France)
Radu Sion           (Stony Brook University, USA)
Neeraj Suri         (TU Darmstadt, Germany)
Willy Susilo        (University of Wollongong, Australia)
Tsuyoshi Takagi     (Kyushu University, Japan)
Vrizlynn Thing      (Institute for Infocomm Research, Singapore)
Jaideep Vaidya      (Rutgers University, USA)
Michael Waidner     (Fraunhofer, Germany)
Haining Wang        (College of William and Mary, USA)
Steve Weis          (AppDirect, USA)
Duncan Wong         (City University of Hong Kong, China)
Avishai Wool        (Tel Aviv University, Israel)
Shouhuai Xu         (University of Texas at San Antonio, USA)
Yanjiang Yang       (Institute for Infocomm Research, Singapore)
Danfeng Yao         (Virginia Tech, USA)
Moti Yung           (Google, USA)

This call for papers and additional information about the
conference can be found at http://icsd.i2r.a-star.edu.sg/acns2012

The history and statistics of ACNS can be found at ACNS Home
— http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

ACNS forum at LinkedIn —
http://www.linkedin.com/groups/ACNS-Applied-Cryptography-Network-Security-4290836

Feb 10

International Conference on Security and Management (SAM 2012)

                              SAM’12
The 2012 International Conference on
Security and Management

Date and Location: July 16-19, 2012, Las Vegas, USA

http://sam.udmercy.edu/sam12

IMPORTANT DATES:

March 12, 2012:    Submission of full papers (about 7 pages)
April 12, 2012:    Notification of acceptance (+/- two days)
April 26, 2012:    Final papers + Copyright/Consent + Registration
July 16-19, 2012:  The 2012 International Conference on Security
and Management (SAM’12)

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. In addition, like prior years, extended versions of
selected papers (about 40%) will appear in journals and edited research
books (publishers include: Springer, Elsevier, …).

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security:
Security algorithms, mobile network security, security in CDN
(Contents Distribution Networks), Virtual Private Network (VPN),
tracing techniques in internet, active networks, security in Grid,
web monitoring, network security engineering, transport-level
security, wireless network security, IP security, electronic mail
security.
O  Cryptographic Technologies:
Security protocols, key management techniques, cryptographic
technologies, applications of block and stream ciphers, applications
of public key cryptology, message authentication and hash functions,
anonymity, digital signature schemes, secret sharing, cryptanalysis.
O  Security Management:
Surveillance technologies, security policies, security for protocol
management, location management, QoS management, resource management,
channel management, mobility management, digital contents copyright
protection, system security management, network security management,
management in network equipment, Storage Area Networks (SAN)
management, information security management, government security
policy, web penetration testing, security operations,
vulnerabilities management.
O  Security Applications:
Security in e-Commerce and M-Commerce, secure OS, watermarking,
high-tech systems at airports, emerging technologies and
applications, Cloud computing security, database security, data
mining security, cyber security automation.
O  Biometrics and Forensics:
Novel biometric methods, forensics, biological security technologies,
face recognition systems, signature recognition systems, cyber
forensics, forensic analysis, biometric technologies for security,
feature extraction and matching algorithms.
O  Hardware Security:
Embedded systems security, cryptographic processors and co-processors,
security architectures, true and pseudorandom number generators,
side channel attacks, fault attacks, hardware tamper resistance,
smart card processors, secure storage devices.
O  Information Assurance:
Mission assurance, risk assessment and risk management, continuity
of operations and business impact analysis, cyber security compliance,
security auditing, security-savvy software development, disaster
recovery, business continuity analysis, access control, secure use
of software, secure performance.
O  Computer Security:
Firewall systems, hacking techniques and related issues, intrusion
detection system (IDS), honeypot, virus issues (detection,
prevention …), trusted computing, alert correlation, attack graphs,
incident responding, malware analysis, incident responding, malware
analysis, intrusion detection.
O  Security Education:
Computer security education, network security education, cyber
security education, cyber security body of knowledge, information
assurance education.

CO-SPONSORS:

Currently being prepared – The ACADEMIC sponsors of the last offering of
SAM (2011) included research labs and centers affiliated with (a
partial list): University of California, Berkeley; Harvard University;
Massachusetts Institute of Technology (MIT); University of Texas at
Austin; University of Southern California; Minnesota Supercomputing
Institute, University of Minnesota; Germany’s University of Siegen; UMIT,
Institute of Bioinformatics and Translational Research, Austria; Georgia
Institute of Technology; University of Iowa; Russian Academy of Sciences,
Russia; University of Naples Federico II, Italy; University of Naples
Parthenope, Italy; Second University of Naples, Italy; ICEL, Texas A&M
University Com.; University of North Dakota; and others.
CORPORATE Co-Sponsors and Sponsors at-large included (a partial list):
Intel Corporation; Microsoft Research; Altera Corporation; Pico Computing;
SuperMicro Computer, Inc., USA; High Performance Computing for Nanotechnology
(HPCNano); International Society of Intelligent Biological Medicine; World
Academy of Biomedical Sciences and Technologies; Int’l Council on Medical
and Care Compunetics; UK Department for Business, Enterprise and Regulatory
Reform; Scientific Technologies Corporation; and HoIP – Health without
Boundaries; and others.

SUBMISSION OF PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site (EasyChair) at:
https://www.easychair.org/account/signin.cgi?conf=sam12

Submissions must be uploaded by March 12, 2012 and they must be in
either MS doc or pdf formats (about 7 pages including all figures,
tables, and references – single space, font size of 10 to 12). All
reasonable typesetting formats are acceptable (later, the authors of
accepted papers will be asked to follow a particular typesetting format
to prepare their final papers for publication.) Papers must not have
been previously published or currently submitted for publication
elsewhere. The first page of the paper should include: title of the
paper, name, affiliation, postal address, and email address for each
author. The first page should also identify the name of the Contact Author
and a maximum of 5 topical keywords that would best represent the content
of the paper. The name of the conference (ie, SAM) that the paper is
being submitted for consideration must be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final
Camera-Ready papers (if accepted) will be limited to 7 (two-column IEEE
style) pages.

Each paper will be peer-reviewed by two experts in the field for originality,
significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee will be
charged to make the final decision (accept/reject); often, this would involve
seeking help from additional referees by using a double-blinded review
process. In addition, all papers whose authors include a member of the
conference program committee will be evaluated using the double-blinded
review process. (Essay/philosophical papers will not be refereed but may be
considered for discussion/panels). Proceedings of SAM will be published
in printed conference books (ISBN) and will also be made available online.
The proceedings will be indexed in science citation databases that track
citation frequency/data for each published paper (science citation databases
such as: Inspec / IET / The Institute for Engineering & Technology; The
French National Center for Scientific Research, CNRS, INIST databases, PASCAL
(covers the core scientific literature in Science; about 90% of inclusions
are journals; only about 9% are proceedings; worldcomp tracks are selected
to be among the 9% – accessable from INIST, Datastar, Dialog, EBSCO, OVID,
Questel.Orbit, Qwam, and STN International); and others. Though, there is
no guarantee that the proceedings will also be included in
EI Compendex/Elsevier indexings, in the past, SAM proceedings were included
in these databases. Therefore, we will also be sending the proceedings for
indexing procedures to EI Compendex/Elsevier. The printed proceedings/books
will be available for distribution on site at the conference.

In addition to the publication of the proceedings, selected authors will be
invited to submit extended versions of their papers for publication in a
number of research books contracted with various publishers (such as,
Springer, Elsevier, …) – these books will be composed after the conference.
Also, many chairs of tracks will be forming journal special issues to be
published after the conference.

MEMBERS OF PROGRAM AND ORGANIZING COMMITTEES:

Currently being finalized:
The members of the Steering Committee of The 2011 congress included:
Dr. Selim Aissi (Chief Strategist, Intel Corp., USA); Prof. Hamid Arabnia
(ISIBM elected Fellow & Professor, University of Georgia; Editor-in-Chief,
The Journal of Supercomputing / Springer; Board member, Journal of
Computational Science / Elsevier; Advisory Board, IEEE TC on Scalable
Computing); Prof. Ruzena Bajcsy (Member, National Academy of Engineering,
IEEE Fellow, ACM Fellow, Professor; University of California, Berkeley,
USA); Prof. Hyunseung Choo (ITRC Director of Ministry of Information &
Communication; Director, ITRC; Director, Korea Information Processing
Society; Assoc. Editor, ACM Transactions on Internet Technology; Professor,
Sungkyunkwan University, Korea); Prof. Winston Wai-Chi Fang (IEEE Fellow,
TSMC Distinguished Chair Professor, National ChiaoTung University, Hsinchu,
Taiwan; Director, System-on-Chip Research Center); Prof. Kun Chang Lee
(Professor of MIS and WCU Professor of Creativity Science, Sungkyunkwan
University, South Korea); Prof. Andy Marsh (Director of HoIP and Director
of HoIP Telecom, UK; Secretary-General WABT; Vice-President Int’l Council
for Engineering and Technology, University of Westminster, UK); Prof. Layne
T. Watson (IEEE Fellow, NIA Fellow, ISIBM Fellow, Fellow of The National
Institute of Aerospace, Professor, Virginia Polytechnic Institute & State
University, USA); Prof. Lotfi A. Zadeh (Member, National Academy of
Engineering; IEEE Fellow, ACM Fellow, AAAS Fellow, AAAI Fellow, IFSA Fellow;
Director, BISC; Professor, University of California, Berkeley, USA).
2012 Publicity Chair: Ashu M. G. Solo (Fellow of British Computer Society;
Principal/R&D Engineer and Mathematician, Maverick Technologies
America Inc.; Director/Interdisciplinary Researcher, Solo Research Lab,
Crocels, Swansea University; Principal/Intelligent Systems Instructor,
Trailblazer Intelligent Systems, Inc.)

The 2012 Program Committee for SAM is currently being compiled. Many
who have already joined the committees are renowned leaders, scholars,
researchers, scientists and practitioners of the highest ranks; many are
directors of research labs., members of National Academy of Engineering,
fellows of various societies, heads/chairs of departments, program
directors of research funding agencies, as well as deans and provosts.

Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the Program
Committee should email Prof. Kevin Daimi ( daimikj@udmercy.edu ) the
following information for consideration/evaluation: Name, affiliation
and position, complete mailing address, email address, a one-page
biography that includes research expertise and the name of the
conference(s) offering to help with. The list of Program Committee of
SAM 2011 appears at:
http://www.world-academy-of-science.org/worldcomp11/ws/conferences/sam11/committee

GENERAL INFORMATION:

The SAM 2012 conference is being held jointly (same location and dates)
with a number of other research conferences (WORLDCOMP). WORLDCOMP is the
largest annual gathering of researchers in computer science, computer
engineering and applied computing. We anticipate to have 2,100 or more
attendees from over 80 countries. WORLDCOMP 2012 will be composed of
research presentations, keynote lectures, invited presentations, tutorials,
panel discussions, and poster presentations. In recent past, keynote/
tutorial/panel speakers have included: Prof. David A. Patterson (pioneer,
architecture, U. of California, Berkeley), Dr. K. Eric Drexler (known as
Father of Nanotechnology), Prof. John H. Holland (known as Father of
Genetic Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of
Grid Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), and many other distinguished speakers. To get a feeling
about the conferences’ atmosphere, see the 2011 delegates photos
available at: http://worldcomp.phanfare.com/5408606

An important mission of WORLDCOMP is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines. 70148

MEASURABLE SCIENTIFIC IMPACT OF WORLDCOMP:

As of February 5, 2012, papers published in WORLDCOMP set of proceedings
have received 20,405 citations. In recent months (November 23, 2011 to
February 5, 2012; ie, in about 75 days), there had been 4,545 citations
to WORLDCOMP papers (about 1,800 citations per month). The above record
is significant (thanks to the authors). As the result of high impact
(based on citations) of WORLDCOMP papers, “Microsoft Academic Search”
has listed each individual track of the congress among its compiled list
of “Top Conferences”. The citation record of WORLDCOMP set of proceedings
is in fact higher than the citation data of many reputable journals in
computer science and computer engineering. Citation data was obtained
obtained from http://academic.research.microsoft.com/ )

USEFUL WEB LINKS:
1. Web site of SAM’12: http://www.world-academy-of-science.org/
The proceedings’ Table of Contents of last offering of SAM (2011) appears at:
http://world-comp.org/proc2011/sam/contents-vol-i.pdf
2. Detailed information about citations to worldcomp proceedings:
http://www.world-academy-of-science.org/worldcomp12/ws/news
3. This announcement contains updated and current information (correct
as of the date of this message). The information that appears in this
announcement supersedes earlier ones.

CONTACT:
General inquiries should be sent to: editor@world-comp.org

Feb 01

9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
 Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
 Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others) 

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted: 

– Full Paper: A full paper presents a work where the research is
 completed or almost finished.  Authors of regular submitted papers
 will indicate at the time of submission whether they would like
 their paper to also be considered for publication as a position
 paper.
– Position Paper: A position paper presents results that are
 preliminary or that simply require few pages to describe. A position
 paper may be a short report and discussion of ideas, facts,
 situations, methods, procedures, or results of scientific research
 (bibliographic, experimental, theoretical, or other) focused on one
 of the conference topics. The acceptance of a position paper is
 restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission), 
which is described at http://secrypt.icete.org/paper_formats.asp.  
Submission page limit is 10 pages for full paper and 6 pages for position papers. 
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.


IMPORTANT DATES
Full Paper submission: March 5, 2012
Authors Notification (full papers): May 4, 2012 
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy 

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore


PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and 
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by 
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Jan 10

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK – http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and 
Internet of Things provide a vision of the Information Society where 
the emphasis is on surrounding people by intelligent interactive 
interfaces and objects and on environments that are capable of 
recognising and reacting to the presence of different individuals 
in a seamless, unobtrusive and invisible manner. 
The success of future ICT technologies, some of which are set as 
priorities by the European Union, will depend on how secure they 
will be made, how privacy and individuals' rights will be protected 
and how individuals will come to trust the intelligent world that 
will surround them and through which they will move. 
WISTP 2012 aims to address the security and privacy issues that are 
increasingly exposed by mobile and wireless communications and related 
services, along with evaluating their impact on business, 
individuals, and the society.

The workshop seeks submissions from academia and industry presenting 
novel research on all theoretical and practical aspects of security 
and privacy of mobile and smart devices, as well as experimental studies 
of fielded systems based on wireless communication, the application 
of security technology, the implementation of systems, and lessons learned. 
We encourage submissions from other communities such as law, 
business and policy that present these communities' perspectives on 
technological issues. Topics of interest include, but are not limited to: 

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
 including Mobile ad hoc networks, RFID systems, 
 Wireless sensor networks and Vehicular networks  
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
 including Biometrics and national ID cards 
* Human behaviour and psychological aspects of security
 including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
 including Security and privacy policies, 
 Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2012  *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be 
at most 16 pages in total in the Springer's LNCS format 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). 
All submissions should be anonymous (i.e., no author names/affiliations 
and obvious citations). Submissions are to be made to the submission 
web site (http://www.wistp.org/submission-details/). 
Only PDF files will be accepted. Submissions not meeting these guidelines 
risk rejection without consideration of their merits. Accepted papers 
will be published by Springer in the Lecture Notes in Computer Science 
series (http://www.springeronline.com/lncs), and the proceedings will be 
available at the workshop. The camera-ready version of the accepted papers 
must follow Springer guidelines (a Latex source file will be required). 

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the workshop. At least one author of each accepted paper 
is required to register with the workshop and present the paper. 
For authors presenting multiple papers, one normal registration 
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs 
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law, 
 University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France 
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece 
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland 
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy 
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU 
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference 
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Jan 03

International Conference on Applied Cryptography and Network Security (ACNS 2012)

CALL FOR PAPERS

10th International Conference on
Applied Cryptography and Network Security (ACNS 2012)

Singapore, June 26-29, 2012


The 10th International Conference on Applied Cryptography and Network
Security (ACNS 2012) will be held in Singapore. The conference seeks
submissions from academia, industry, and government presenting novel
research on all aspects of applied cryptography as well as network
security and privacy. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged.
The conference has two tracks: a research track and an industry
track. Topics of interest include, but are not limited to:

– Access control
– Applied cryptography
– Automated  protocols analysis
– Biometric security and privacy
– Complex systems security
– Critical infrastructure protection
– Cryptographic primitives and protocols
– Data protection
– Database and system security
– Digital rights management
– Email and web security
– Identity management
– Intellectual property protection
– Internet fraud
– Intrusion detection and prevention
– Key management
– Malware
– Network security protocols
– Privacy, anonymity, and untraceability
– Privacy-enhancing technology
– Protection for the future Internet
– Secure mobile agents and mobile code
– Security in e-commerce
– Security in P2P systems
– Security in pervasive/ubiquitous computing
– Security and privacy in cloud and grid systems
– Security and privacy in distributed systems
– Security and privacy in smart grids
– Security and privacy in wireless networks
– Security and privacy metrics
– Trust management
– Usability and security


SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should
be at most 18 pages for research track and at most 8 pages for
industry track, including the bibliography and well-marked
appendices, and should follow the LNCS style. Submissions are
to be made to the submission web site at
http://www.easychair.org/account/signin.cgi?conf=acns2012.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 5, 2012
(11:59 p.m. Samoa time). Authors should indicate whether their
submission should be considered for the best student paper award;
any paper co-authored by at least a full time student is eligible.
Authors of accepted papers must guarantee that their papers will
be presented at the conference. Papers accepted for the research
track will be published in proceedings published by Springer's LNCS
and available at the conference. Extended versions of selected best
papers will be invited for a special issue on the Journal of
Computer Security.


IMPORTANT DATES
Paper submission due: February 5, 2012 (11:59PM American Samoa time)
Notification to authors: April 10, 2012
Camera ready due: April 24, 2012


GENERAL CHAIR
Jianying Zhou
I2R, Singapore


PROGRAM CHAIRS
Feng Bao
I2R, Singapore

Pierangela Samarati
Universita` degli Studi di Milano, Italy


ORGANIZING CHAIR
Shen-Tat Goh
I2R, Singapore


PUBLICITY CHAIRS
Xinyi Huang
I2R, Singapore

Giovanni Livraga
Universita` degli Studi di Milano, Italy


PROGRAM COMMITTEE
Michel Abdalla      (ENS, France)
Vijay Atluri        (Rutgers University, USA)
Lucas Ballard       (Google, USA)
Paulo Barreto       (University of Sao Paulo, Brazil)
Lujo Bauer          (Carnegie Mellon University, USA)
Marina Blanton      (University of Notre Dame, USA)
Carlo Blundo        (Universita' degli Studi di Salerno, Italy)
Levente Buttyan     (Budapest Uni of Technology and Economics, Hungary)
Roy Campbell        (University of Illinois at Urbana-Champaign, USA)
Liqun Chen          (HP Labs, UK)
Chen-Mou Cheng      (National Taiwan University, Taiwan)
Jung Hee Cheon      (Seoul National University, Korea)
Sherman S.M. Chow   (University of Waterloo, Canada)
Sabrina De Capitani di Vimercati (Universita' degli Studi di Milano, Italy)
Robert Deng         (Singapore Management University, Singapore)
Roberto Di Pietro   (Universita' di Roma Tre, Italy)
Xuhua Ding          (Singapore Management University, Singapore)
Kevin Du            (Syracuse University, USA)
Wu-Chang Feng       (Portland State University, USA)
Sara Foresti        (Universita' degli Studi di Milano, Italy)
Keith Frikken       (Miami University, USA)
Rosario Gennaro     (IBM Research, USA)
Dieter Gollmann     (Hamburg University of Technology, Germany)
Stefanos Gritzalis  (University of the Aegean, Greece)
Dawu Gu             (Shanghai Jiaotong University, China)
Guofei Gu           (Texas A&M University, USA)
Sushil Jajodia      (George Mason University, USA)
Stanislaw Jarecki   (University of California Irvine, USA)
Aaron Johnson       (Naval Research Laboratory, USA)
Angelos Keromytis   (Columbia University, USA)
Steve Kremer        (INRIA Nancy, France)
Ralf Kuesters       (University of Trier, Germany)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Adam J. Lee         (University of Pittsburgh, USA)
Hui Li              (Xidian University, China)
Zhenkai Liang       (National University of Singapore, Singapore)
Benoit Libert       (Universite Catholique de Louvain, Belgium)
Peng Liu            (Penn State University, USA)
Michael Locasto     (University of Calgary, Canada)
Javier Lopez        (University of Malaga, Spain)
Mark Manulis        (TU Darmstadt, Germany)
Atsuko Miyaji       (JAIST, Japan)
Refik Molva         (EURECOM, France)
Yi Mu               (University of Wollongong, Australia)
Peng Ning           (North Carolina State University, USA)
Elisabeth Oswald    (University of Bristol, UK)
Vincent Rijmen      (Katholieke Universiteit Leuven, Belgium)
Matt Robshaw        (Orange Labs, France)
Radu Sion           (Stony Brook University, USA)
Neeraj Suri         (TU Darmstadt, Germany)
Willy Susilo        (University of Wollongong, Australia)
Tsuyoshi Takagi     (Kyushu University, Japan)
Vrizlynn Thing      (Institute for Infocomm Research, Singapore)
Jaideep Vaidya      (Rutgers University, USA)
Michael Waidner     (Fraunhofer, Germany)
Haining Wang        (College of William and Mary, USA)
Steve Weis          (AppDirect, USA)
Duncan Wong         (City University of Hong Kong, China)
Avishai Wool        (Tel Aviv University, Israel)
Shouhuai Xu         (University of Texas at San Antonio, USA)
Yanjiang Yang       (Institute for Infocomm Research, Singapore)
Danfeng Yao         (Virginia Tech, USA)
Moti Yung           (Google, USA)


This call for papers and additional information about the
conference can be found at http://icsd.i2r.a-star.edu.sg/acns2012

The history and statistics of ACNS can be found at ACNS Home
 http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

Dec 19

11th European Conference on Information Warfare ECIW 2012

11th European Conference on Information Warfare ECIW 2012.  

 

Topics for submissions may include, but are not limited to:

§         i-Warfare principles, theory and policy and techniques

§         Cyber conflict, Cyber-terrorism and Cyber-fraud

§         Physical security

§         National security policy

§         Information security governance and management

§         Information warfare and security education

§         Information Assurance and Information operations

§         Psychological warfare

§         Perception management

§         Legal issues concerned with information warfare and e-Crime

§         Ethical, political and social issues relating to information warfare

§         SMEs – Small-to-medium Size Enterprises Security issues

§         Critical national infrastructure protection

§         The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)

§         Hacking and cracking

§         Biometrics

§         e-Intelligence/counter-intelligence

§         Cryptography : classical  and malicious

§         Networked Centric War

§         Network anomaly detection models

§         Malware and anti-malware technologies

§         Non-traditional enemies

§         Wireless Threats

§         Reflector attacks

§         Computers-as-weapons

§         Risk Management

§         Virtual Intrusion Detection

§         Collaborative decision making

§         Acute situational awareness

§         Firewalls

§         Phishing and spam

§         Digital forensics

§         Current Anti Virus Technologies

§         PSYOPS

§         Mobile Virus

§         RFID Virus

§         ISO 27001

§         Defence steganography and Unidirectional linguistic steganography

§         Traffic classification

§         Public Key Infrastructure

§         Machine Learning Risk

§         Mathematical-filtering

§         SecureMDA

§         Image-processing

          


Nov 30

International Conference on Security and Cryptography – SECRYPT 2012

CALL FOR PAPERS

International Conference on Security and Cryptography – SECRYPT 2012

Website: http://www.secrypt.icete.org/
July 24 – 27, 2012
Rome, Italy

In cooperation with IEICE (The Institute of Electronics, Information and Communication Engineers)
and SWIM (Special Interest Group on Software Interprise Modeling)

Sponsored by INSTICC
INSTICC is member of WfMC (Workflow Management Coalition)


Important Deadlines: 
Regular Paper submission: March 5, 2012
Authors Notification (regular papers): April 24, 2012
Final Regular Paper Submission and Registration: May 7, 2012

###############################################################


Dear ,

We would like to draw your attention to the International Conference on Security and Cryptography (SECRYPT-2012), which has currently an open call for papers. 

Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.

SECRYPT 2012 is part of the International Joint Conference on e-Business and Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

These six concurrent conferences are held in parallel and registration to one warrants delegates to attend all six.

ICETE is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 409 submissions, 12% were accepted as full papers, 16% were presented as short papers and 13% as posters.

The conference program features a number of Keynote Lectures to be delivered by distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. DEZO
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book. 
Additionally, a short list of papers presented at the conference, will also be selected for publication in the Journal of Information Processing Systems (JIPS).
Furthermore, a short list of papers presented at the conference, will be selected for publication in a special issue of JNW – Journal of Networks

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.


CONFERENCE TOPICS
   * Access Control
   * Applied Cryptography
   * Biometrics Security and Privacy
   * Critical Infrastructure Protection
   * Data Integrity
   * Data Protection
   * Database Security and Privacy
   * Digital Forensics
   * Digital Rights Management
   * Ethical and Legal Implications of Security and Privacy
   * Human Factors and Human Behaviour Recognition Techniques
   * Identification, Authentication and Non-repudiation
   * Identity Management
   * Information Hiding
   * Information Systems Auditing
   * Insider Threats and Countermeasures
   * Intellectual Property Protection
   * Intrusion Detection & Prevention
   * Management of Computing Security
   * Network Security
   * Organizational Security Policies
   * Peer-to-Peer Security
   * Personal Data Protection for Information Systems
   * Privacy
   * Reliability and Dependability
   * Risk Assessment
   * Secure Cloud Computing
   * Secure Software Development Methodologies
   * Security and Privacy in Mobile Systems
   * Security and privacy in Complex Systems
   * Security and Privacy in IT Outsourcing
   * Security and Privacy in Location-based Services
   * Security and Privacy in Pervasive/Ubiquitous Computing
   * Security and Privacy in Social Networks
   * Security and Privacy in Web Services
   * Security and Privacy Policies
   * Security Area Control
   * Security Deployment
   * Security Engineering
   * Security for Grid Computing
   * Security in Distributed Systems
   * Security Information Systems Architecture and Design and Security Patterns
   * Security Management
   * Security Metrics and Measurement
   * Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
   * Security Verification and Validation
   * Sensor and Mobile Ad Hoc Network Security
   * Service and Systems Design and QoS Network Security
   * Software Security
   * Trust management and Reputation Systems
   * Ubiquitous Computing Security
   * Wireless Network Security (WiFi, WiMAX, WiMedia and others)


CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore 


Please check further details at the conference web site (http://www.secrypt.icete.org). 

Should you have any question or suggestion please don't hesitate to contact me.


Kind regards,
Monica Saramago
SECRYPT Secretariat

Av. D. Manuel I, 27A 2.esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
Email: secrypt.secretariat@insticc.org
Web: http://www.secrypt.icete.org

Nov 24

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)

*****************
CALL FOR PAPERS
*****************

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK – http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and 
Internet of Things provide a vision of the Information Society where 
the emphasis is on surrounding people by intelligent interactive 
interfaces and objects and on environments that are capable of 
recognising and reacting to the presence of different individuals 
in a seamless, unobtrusive and invisible manner. 
The success of future ICT technologies, some of which are set as 
priorities by the European Union, will depend on how secure they 
will be made, how privacy and individuals' rights will be protected 
and how individuals will come to trust the intelligent world that 
will surround them and through which they will move. 
WISTP 2012 aims to address the security and privacy issues that are 
increasingly exposed by mobile and wireless communications and related 
services, along with evaluating their impact on business, 
individuals, and the society.

The workshop seeks submissions from academia and industry presenting 
novel research on all theoretical and practical aspects of security 
and privacy of mobile and smart devices, as well as experimental studies 
of fielded systems based on wireless communication, the application 
of security technology, the implementation of systems, and lessons learned. 
We encourage submissions from other communities such as law, 
business and policy that present these communities' perspectives on 
technological issues. Topics of interest include, but are not limited to: 

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
 including Mobile ad hoc networks, RFID systems, 
 Wireless sensor networks and Vehicular networks  
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
 including Biometrics and national ID cards 
* Human behaviour and psychological aspects of security
 including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
 including Security and privacy policies, 
 Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2011  *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be 
at most 16 pages in total in the Springer's LNCS format 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). 
All submissions should be anonymous (i.e., no author names/affiliations 
and obvious citations). Submissions are to be made to the submission 
web site (http://www.wistp.org/submission-details/). 
Only PDF files will be accepted. Submissions not meeting these guidelines 
risk rejection without consideration of their merits. Accepted papers 
will be published by Springer in the Lecture Notes in Computer Science 
series (http://www.springeronline.com/lncs), and the proceedings will be 
available at the workshop. The camera-ready version of the accepted papers 
must follow Springer guidelines (a Latex source file will be required). 

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the workshop. At least one author of each accepted paper 
is required to register with the workshop and present the paper. 
For authors presenting multiple papers, one normal registration 
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs 
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law, 
 University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France 
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece 
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland 
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy 
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU 
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference 
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Nov 22

10th International Conference on Applied Cryptography and Network Security (ACNS 2012)

CALL FOR PAPERS
10th International Conference on Applied Cryptography and Network
Security (ACNS 2012)
Singapore — June 26-29, 2012


The 10th International Conference on Applied Cryptography and Network
Security (ACNS 2012) will be held in Singapore. The conference seeks
submissions from academia, industry, and government presenting novel
research on all aspects of applied cryptography as well as network
security and privacy. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged.
The conference has two tracks: a research track and an industry track.
Topics of interest include, but are not limited to:

– Access control
– Applied cryptography
– Automated  protocols analysis
– Biometric security and privacy
– Complex systems security
– Critical infrastructure protection
– Cryptographic primitives and protocols
– Data protection
– Database and system security
– Digital rights management
– Email and web security
– Identity management
– Intellectual property protection
– Internet fraud
– Intrusion detection and prevention
– Key management
– Malware
– Network security protocols
– Privacy, anonymity, and untraceability
– Privacy-enhancing technology
– Protection for the future Internet
– Secure mobile agents and mobile code
– Security in e-commerce
– Security in P2P systems
– Security in pervasive/ubiquitous computing
– Security and privacy in cloud and grid systems
– Security and privacy in distributed systems
– Security and privacy in smart grids
– Security and privacy in wireless networks
– Security and privacy metrics
– Trust management
– Usability and security


SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should
be at most 18 pages for research track and at most 8 pages for
industry track, including the bibliography and well-marked
appendices, and should follow the LNCS style. Submissions are
to be made to the submission web site at
http://www.easychair.org/account/signin.cgi?conf=acns2012.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 5, 2012
(11:59 p.m. Samoa time). Authors should indicate whether their
submission should be considered for the best student paper award;
any paper co-authored by at least a full time student is eligible.
Authors of accepted papers must guarantee that their papers will
be presented at the conference. Papers accepted for the research
track will be published in proceedings published by Springer's LNCS
and available at the conference. Extended versions of selected best
papers will be invited for a special issue on the Journal of
Computer Security.


IMPORTANT DATES
Paper submission due: February 5, 2012 (11:59 p.m. Samoa time)
Notification to authors: April 10, 2012
Camera ready due: April 24, 2012


GENERAL CHAIR
Jianying Zhou
I2R, Singapore


PROGRAM CHAIRS
Feng Bao
I2R, Singapore

Pierangela Samarati
Universita` degli Studi di Milano, Italy


ORGANIZING CHAIR
Shen-Tat Goh
I2R, Singapore


PUBLICITY CHAIRS
Xinyi Huang
I2R, Singapore

Giovanni Livraga
Universita` degli Studi di Milano, Italy


PROGRAM COMMITTEE
Michel Abdalla      (ENS, France)
Vijay Atluri        (Rutgers University, USA)
Lucas Ballard       (Google, USA)
Paulo Barreto       (University of Sao Paulo, Brazil)
Lujo Bauer          (Carnegie Mellon University, USA)
Marina Blanton      (University of Notre Dame, USA)
Carlo Blundo        (Universita' degli Studi di Salerno, Italy)
Levente Buttyan     (Budapest Uni of Technology and Economics, Hungary)
Roy Campbell        (University of Illinois at Urbana-Champaign, USA)
Liqun Chen          (HP Labs, UK)
Chen-Mou Cheng      (National Taiwan University, Taiwan)
Jung Hee Cheon      (Seoul National University, Korea)
Sherman Chow        (University of Waterloo, Canada)
Sabrina De Capitani di Vimercati (Universita' degli Studi di Milano, Italy)
Robert Deng         (Singapore Management University, Singapore)
Roberto Di Pietro   (Universita' di Roma Tre, Italy)
Xuhua Ding          (Singapore Management University, Singapore)
Kevin Du            (Syracuse University, USA)
Wu-Chang Feng       (Portland State University, USA)
Sara Foresti        (Universita' degli Studi di Milano, Italy)
Keith Frikken       (Miami University, USA)
Rosario Gennaro     (IBM Research, USA)
Dieter Gollmann     (Hamburg University of Technology, Germany)
Stefanos Gritzalis  (University of the Aegean, Greece)
Dawu Gu             (Shanghai Jiaotong University, China)
Guofei Gu           (Texas A&M University, USA)
Sushil Jajodia      (George Mason University, USA)
Stanislaw Jarecki   (University of California Irvine, USA)
Aaron Johnson       (Naval Research Laboratory, USA)
Angelos Keromytis   (Columbia University, USA)
Steve Kremer        (INRIA Nancy, France)
Ralf Kuesters       (University of Trier, Germany)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Adam J. Lee         (University of Pittsburgh, USA)
Hui Li              (Xidian University, China)
Zhenkai Liang       (National University of Singapore, Singapore)
Benoit Libert       (Universite Catholique de Louvain, Belgium)
Peng Liu            (Penn State University, USA)
Michael Locasto     (University of Calgary, Canada)
Javier Lopez        (University of Malaga, Spain)
Mark Manulis        (TU Darmstadt, Germany)
Atsuko Miyaji       (JAIST, Japan)
Refik Molva         (EURECOM, France)
Yi Mu               (University of Wollongong, Australia)
Peng Ning           (North Carolina State University, USA)
Elisabeth Oswald    (University of Bristol, UK)
Vincent Rijmen      (Katholieke Universiteit Leuven, Belgium)
Matt Robshaw        (Orange Labs, France)
Radu Sion           (Stony Brook University, USA)
Neeraj Suri         (TU Darmstadt, Germany)
Willy Susilo        (University of Wollongong, Australia)
Tsuyoshi Takagi     (Kyushu University, Japan)
Vrizlynn Thing      (Institute for Infocomm Research, Singapore)
Jaideep Vaidya      (Rutgers University, USA)
Michael Waidner     (Fraunhofer, Germany)
Haining Wang        (College of William and Mary, USA)
Steve Weis          (AppDirect, USA)
Duncan Wong         (City University of Hong Kong, China)
Avishai Wool        (Tel Aviv University, Israel)
Shouhuai Xu         (University of Texas at San Antonio, USA)
Yanjiang Yang       (Institute for Infocomm Research, Singapore)
Danfeng Yao         (Virginia Tech, USA)
Moti Yung           (Google, USA)


This call for papers and additional information about the
conference can be found at http://icsd.i2r.a-star.edu.sg/acns2012

The history and statistics of ACNS can be found at ACNS Home
 http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/