征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Technical papers and panel proposals are solicited. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2017. The Proceedings will be made freely accessible from the Internet Society webpages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

征稿信息

重要日期

2016-08-16
初稿截稿日期

征稿范围

  • Anti-malware techniques: detection, analysis, and prevention

  • Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques

  • Security for future Internet architectures and designs (e.g., Software-Defined Networking)

  • High-availability wired and wireless networks

  • Implementation, deployment and management of network security policies

  • Integrating security in Internet protocols: routing, naming, network management

  • Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management

  • Intrusion prevention, detection, and response

  • Privacy and anonymity technologies

  • Security and privacy for distributed cryptocurrencies

  • Security and privacy in social networks

  • Public key infrastructures, key management, certification, and revocation

  • Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost

  • Security for collaborative applications: teleconferencing and video-conferencing

  • Security for cloud computing

  • Security for emerging technologies: sensor/wireless/mobile/personal networks and systems

  • Security for future home networks, Internet of Things, body-area networks

  • Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)

  • Security for peer-to-peer and overlay network systems

  • Security for Vehicular Ad-hoc Networks (VANETs)

  • Security of Web-based applications and services

  • Trustworthy Computing mechanisms to secure network protocols and distributed systems

  • Usable security and privacy 

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    02月26日

    2017

    03月03日

    2017

  • 08月16日 2016

    初稿截稿日期

  • 03月03日 2017

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询