Email Login
News | Research | DeepLearning | Seminar | Q&A


GreatMind 2016.04.14 12:04 조회 수 : 70

Fourth International Symposium on Security in Computing and Communications (SSCC’16)
September 21-24, 2016, Jaipur, India
SSCC’16 aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. SSCC'16 will be held in Jaipur, India. Jaipur is a major tourist attraction in India and belongs to the tourist Golden Triangle of Delhi, Jaipur and Agra. The Symposium will feature plenary/keynote talks, workshops, demonstrations, parallel technical sessions and tutorials.

All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS). The proceedings will be available via the SpringerLink digital library. The volumes of this series are submitted for inclusion to the leading indexing services including DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.15

The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications.

The topics of interests include, but are not limited to:

Anti-Forensics Techniques
Application Security
Authentication and Access Control Systems
Critical Infrastructure Protection
Cyber Warfare Trends and Approaches
Denial-of-Service Attacks and Countermeasures
Digital Forensics
Digital Rights Management
Distributed and Pervasive Systems Security
Embedded Systems Security
Enterprise Systems Security
Executable Content and Content Filtering
File and Files System Security
Fraud Management
Hardware Security
Human-Computer Interaction and Security
Identity Management
Intellectual Property Protection
Key Distribution and Management
Mobile System Security
Multimedia and Document Security
Network Infrastructure Security
Operating Systems and Database Security
Peer-to-Peer Security
Secure Communications and Information Flow
Secure Sensor Networks
Security for Grid Computing
Security in Cloud Computing/Social Networks
Security in e-services
Security of Web-Based Applications
Surveillance Systems
Analysis of Network and Security Protocols
Authorship Analysis
Biometrics Standards and Standardization
Border Security
Business Continuity & Disaster Recovery Planning
Crowd Management
Emergency Response and Management
Encryption and Cryptography
Forecasting Terrorism
Incident Handling and Penetration Testing
Information Hiding
Intrusion and Anomaly Detection and Prevention
Investigation of Insider Attacks
Language-Based Security
Malware Forensics and Anti-Malware Techniques
Protocol Security
Secure Software Development
Security Architectures
Security Metrics
Self-Protecting and Self-Healing Systems
Social Engineering
Social Network Analysis
Template Protection and Liveliness Detection
Threats, Vulnerabilities, and Risk Management
Economics of Security
Laws and Regulations/Legal Issues
Security Policies and Trust Management
Security Education and Training
New Threats and Non-Traditional Approaches
Theories, Methods and Tools in Managing Security

Special Session on Cloud Security and Cryptography
Accountability for Cloud Computing
Availability, Recovery and Auditing
Cloud Access Control and Key Management
Cloud-Centric Threat Models
Coding and Cryptography for Secure Cloud
Parallel and Dynamic Searchable Symmetric Encryption
Attribute-Based Encryption
Multi-Party Computation with Low Communication
Homomorphic Encryption
Cryptographic Cloud Storage
Randomness Testing of Modern Encryption Techniques
Evolution of Cloud Security Measures
Failure Detection and Prediction
Cloud Forensics
Identity Management in the Cloud
Integrity and Verifiable Computation
Privacy Preserving Technologies in Cloud Computing
Proofs of Storage
Remote Attestation Mechanisms in Clouds
Scalability of Security in Global-Size Clouds
Secure Cloud Architecture
Secure Computation Outsourcing
Secure Data Management
Secure Management of Virtualized Resources
Secure Mobile Cloud
Security for Emerging Cloud Programming Models
Secured Searching in Cloud Data
Trust and Policy Management in Clouds
Continuous Security Monitoring
New Cloud-Aware Web Service Security Paradigms and Mechanisms
Business and Security Risk Models and Clouds
Case Studies and Experimental Implementations

Important Dates
Full Paper Submission Ends: April 30, 2016
Acceptance Notification: June 30, 2016
Final Paper Deadline: July 31, 2016

번호 제목 글쓴이 날짜 조회 수
59 [CFP] IEEE JSTSP - Signal Processing and Machine Learning for Education and Human Learning at Scale GreatMind 2016.05.10 88
58 [Journal Issue] Pattern Recognition Letters Volume 79 , Pages 1-112, 1 August 2016 GreatMind 2016.07.02 87
57 [CFP] ACIVS 2020 - Auckland New Zealand GreatMind 2019.04.16 86
56 [Journal issue] Journal of Visual Communication and Image Representation: Alert 20 June-26 June GreatMind 2016.06.27 86
55 [CFP] IEEE ICASSP 2017 GreatMind 2016.06.19 86
54 [Journal Issue] Image and Vision Computing Volume 54 GreatMind 2016.10.29 84
53 [CFP] Call for 2017 Summer School Proposals - IEEE SPS Summer Schools in Signal Processing GreatMind 2016.09.21 84
52 [CFP] APSIPA 2016 GreatMind 2016.04.11 82
51 [CFP IEEE SP Magazine Special Issue on Music Signal Processing GreatMind 2017.10.19 81
50 [CFP] IEEE Region 10 Humanitarian Technology Conference 2016 GreatMind 2016.05.04 81
49 [CFP] Call for Papers IEEE TMM Special Issue on Multimedia Computing with Interpretable Machine Learning GreatMind 2019.02.15 79
48 [Journal Issue] Journal of Visual Communication and Image Representation: Alert 31 July-6 August GreatMind 2016.08.06 79
47 [CFP] The 20th Int'l Conf. on Image Processing, Computer Vision, & Pattern Recognition (IPCV'16) BGKim 2016.04.07 79
46 [CFP] DCC 2018 Call For Papers - Data Compression Conference, Snowbird, UT GreatMind 2017.08.24 76
45 [Journal issue] Image and Vision Computing: Alert 26 May-1 June GreatMind 2016.06.03 76
44 [CFP] IEEE Service and Cloud Computing (IEEE SC2 2016) in Fiji - Submission deadline: Sep. 15, 2016 (Firm) GreatMind 2016.09.03 74
43 [CFP] 2016 International Conference on Machine learning and Signal Processing (MALSIP) GreatMind 2016.07.01 74
42 [Journal Issue] Journal of Real-Time Image Processing, Vol. 12, Issue 3 GreatMind 2016.10.05 73
41 [CFP] IEEE Journal of Selected Topics in Signal Processing GreatMind 2016.05.02 72
» [CFP] SSCC’16 GreatMind 2016.04.14 70