Monday, November 15, 2010

[DMANET] CFP: IEEE Infocom Workshop on Security in Computers, Networking and Communications

************** SCNC 2011 | Call for Papers ***************


SCNC 2011, The First IEEE International Workshop on Security in Computers,
Networking and Communications

In conjunction with IEEE INFOCOM 2011 April 10-15, 2011, Shanghai, China

Web page:




The IEEE International Workshop on Security in Computers, Networking and
Communications (SCNC) is an international forum for researchers, developers,
and practitioners to demonstrate new ideas, techniques, and tools on secure
and usable computer and communications systems and user privacy, new threats
to confidentiality, integrity, and usability of computer and communications
systems and user privacy, for users to exchange their experience in new
tools and techniques that lead to improvement of security, integrity, and
usability of computer and communication systems. The workshop welcomes
academia, government, industry, and contributing individuals to submit
unpublished papers in theoretical and practical aspects of computer and
communications security.



Original, unpublished contributions are solicited in ALL security aspects
of computers, networking and communications. Possible topics of interest
include, but are not limited to:

* Accountability, non-repudiation, privacy, and anonymity
* Usability and security
* Computer systems security
* Software security
* Network security
* Security in networked sensing and control systems
* Attacks and counter measures
* Computer and network forensics
* Attacks, security mechanisms, and security services
* Authentication
* Access control
* Multicast security
* Security specification techniques
* Encryption and decryption
* Secure routing protocols
* Formal analyses
* Security group communications
* Intrusion detection
* Key management
* Trust establishment
* Revocation of malicious parties
* Security policies
* Fraudulent usage
* Dependability and reliability
* Prevention of traffic analysis
* Secure PHY/MAC/routing protocols
* Secure location determination
* Denial of service
* Network security performance evaluation
* Tradeoff analysis between performance and security
* Design or analysis of security protocols
* Mobile and Wireless network security, including ad hoc
networks, P2P networks, sensor networks, mesh networks
and social networks
* Trust and reputation in ubiquitous environments
* Web, eBusiness, eCommerce, eGovernment security
* Security standards



Accepted papers will be published in the IEEE Digital Library after the
conference and included in INFOCOM 2012 proceedings. Selected best papers
will be invited to a journal special issue.



Papers must not exceed 6 single-spaced and two-column pages using at least
10 point size type on 8.5 x 11 inches pages, and must be formated in
strict accordance with the IEEE Communications Society author guidelines.
Submissions are being accepted with the understanding that they describe
original research, neither published nor under review elsewhere. Detailed
submission instructions will be available at



* Paper submission: December 15, 2010
* Author notification: Feburary 15, 2011
* Final manuscript due: March 15, 2011



* Steering Committee Co-Chairs:

Xuemin (Sherman) Shen, University of Waterloo, Canada
Jie Wu, Temple University, Philadelphia, USA

* General Co-Chairs:

Xiuzhen Cheng, George Washington University, USA
Xiaodong Lin, University of Ontario Institute of Technology,
Yang Xiao, University of Alabama, USA

* Program Co-Chairs:

* Computer System Security Track
Hui Chen, Virginia State University, USA

* Communications and Networking Security Track
Xu Li, INRIA Lille-Nord Europe, France

* Privacy and Trust Track
Rongxing Lu, University of Waterloo, Canada

* Information Security Technology Track
Bo Sun, Lamar University, Beaumont, USA

* Publicity Co-Chairs:

Zhenfu Cao, Shanghai Jiao Tong University, China
Nei Kato, Tohoku University, Japan
Xiaohui Liang, University of Waterloo, Canada
Haifeng Qian, East China Normal University, China

For a complete list of committee and board members, please visit
* Contributions to be spread via DMANET are submitted to
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.