The increasing usages of Web-based technologies have enabled numerous benefits in people’s daily life, from mobile social applications to heterogeneous high performance computing. The implementations of the Internet-related solutions are considered one of the important approaches for enterprises to grow their businesses. However, novel mechanisms using networking techniques also introduce new threats harming users’ privacy information and operations. Two critical aspects in Web security are cyber security and cloud computing. IEEE CSCloud 2018 focuses on these two aspects and aims to gather recent achievements in cyber security and cloud computing fields. The conference invites those papers that concentrate on new paradigms, algorithms, and applications in cyber security or cloud computing. We also encourage researchers and practitioners to build up the connections between academia and industry.
We aim to collect the latest achievements and exchange research ideas in the domains of intelligent data and security at this academic event. Joining CSCloud 2018 will be a great opportunity for your to reach academics, professionals, and vendors who have the same research interests as yours. IEEE CSCloud 2018 is the next edition of a series of successful academic events, including CSCloud 2017 (New York, USA), CSCloud 2016 (Beijing, China), and CSCloud 2015 (New York, USA).
Submitted manuscripts should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column, template available at IEEE website. Full Papers (up to 6 pages complimentary, or 12 pages with the over length charge), Short Papers (up to 4 pages complimentary, or 5 pages with the over length charge). See Instructions for authors. All paper submissions must represent original and unpublished work. Please refer to our Submission Page for detailed information about the paper submission.
The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. The conference will be organised by the Computer Security and Industrial Cryptography (COSIC) group at KU Leuven. The proceedings of ACNS 2018 will be published by Springer.
ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.
The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include but are not limited to: -Access control -Applied cryptography -Automated security analysis -Biometric security/privacy -Block chain and cryptocurrencies -Cloud security/privacy -Complex systems security -Critical infrastructure -Cryptographic primitives -Cryptographic protocols -Data protection -Database/system security -Digital rights management -Email, app and web security -Future Internet security -Human factors in security -Identity management -IP protection -Internet fraud, cybercrime -Internet-of-Things security -Intrusion detection -Key management -Malware -Mobile/wireless/5G security -Network security protocols -Privacy/anonymity, PETs -Security in e-commerce -Security in grid systems -Security in P2P systems -Security/privacy metrics -Trust management -Ubiquitous security/privacy -Usability in security/privacy
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 27th USENIX Security Symposium will be held August 15–17, 2018, in Baltimore, MD, USA.
All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. Submissions are due on Thursday, February 8, 2018, 5:00 p.m. PST. The Symposium will span three days, with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located workshops will precede the Symposium on August 13 and 14.
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to: -System security -Network security -Security analysis -Data-driven security and measurement studies -Privacy-enhancing technologies and anonymity -Usable security and privacy -Language-based security -Hardware security -Research on surveillance and censorship -Social issues and security -Applications of cryptography
This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.
信息安全及密码学
NCS 2018
ANNUAL NATIONAL CYBER SECURITY SUMMIT
全文截稿: 2018-03-01
开会时间: 2018-06-05
会议难度: ★★
CCF分类: 无
会议地点: Huntsville, AL, USA
网址:www.nationalcybersummit.com
This is a call for “original” short papers documenting cybersecurity research. Unpublished papers of up to 8 pages are solicited. Cybersecurity is a multidisciplinary field including information security, fraud examination, forensic science, military science, management science, systems engineering, security engineering, criminology, computer science, and others. The National Cyber Summit Research Track solicits research papers in the following areas (non-exclusive list): -Industrial Control System Security -Network Security -Database Security -Digital Forensics -Secure Architectures -Societal Impacts/Ethics -Securing the Internet of Things -Interplay of technical and non-technical issues in cybersecurity -Supply chain cybersecurity research -Cybersecurity standards and guidelines -Case studies in cybersecurity -CISO challenges/governance -Cybersecurity trends -Cybersecurity and diversity -Cyber operations -Data mining for cybersecurity -Systems engineering for cybersecurity -Risk management -Design of secure systems -Cloud computing -Malware reverse engineering -Intrusion and malware detection -Cryptography -Trusted systems -Provenance -Cyber-operations -Response and recovery -Cybersecurity curriculum design -Cybersecurity competitions – e.g., design, results, objectives, structure -Emerging needs for cybersecurity curriculum -Innovative approaches to faculty development and capacity building