Call for Papers
You are invited to submit a full paper for consideration. All accepted papers will be published in the SAM'15 conference proceedings (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems. Those interested in proposing workshops/sessions, should refer to the "Call for Sessions/Workshops" section.
Topics of interest include, but are not limited to, the following:
-
Network Security
- Security Algorithms
- Mobile Network Security
- Security in CDN (Contents Distribution Networks)
- Virtual Private Network (VPN)
- Tracing Techniques in Internet
- Active Networks
- Security in Grid
- Web Monitoring
- Control Systems/SCADA Security
- Network Security Engineering
- Transport-Level Security
- Wireless Network Security
- IP Security
- Electronic Mail security
-
Cryptographic Technologies
- Security Protocols
- Key Management Techniques
- Cryptographic Technologies
- Applications of Block and Stream Ciphers
- Applications of Public Key Cryptology
- Message Authentication and Hash Functions
- Anonymity
- Digital Signature Schemes
- Secret Sharing
- Cryptanalysis
-
Security Management
- Surveillance Technologies
- Security Policies
- Security for Protocol Management
- Location Management
- QoS Management
- Resource Management
- Channel Management
- Mobility Management
- Digital Contents Copyright Protection
- System Security Management
- Network Security Management
- Management in Network Equipment
- Storage Area Networks (SAN) Management
- Information Security Management
- Government Security Policy
- Web Penetration Testing
- Security Operations
- Vulnerabilities Management
- Change and Patch Management
-
Security Applications
- Security in E-Commerce and M-Commerce
- Secure OS
- Watermarking
- High-Tech Systems at Airports
- Emerging Technologies and Applications
- Cloud Computing Security
- Database Security
- Data Mining Security
- Cyber Security Automation
-
Biometrics and Forensics
- Novel Biometric Methods
- Forensics
- Biological Security Technologies
- Face Recognition Systems
- Signature Recognition Systems
- Cyber Forensics
- Forensic Analysis
- Biometric Technologies for Security
- Feature Extraction and Matching Algorithms
-
Hardware Security
- Embedded Systems Security
- Cryptographic Processors and Co-Processors
- Security Architectures
- True and Pseudorandom Number Generators
- Side Channel Attacks
- Fault Attacks
- Hardware Tamper Resistance
- Smart Card Processors
- Secure Storage Devices
-
Information Assurance
- Mission Assurance
- Risk Assessment and Risk Management
- Continuity of Operations and Business Impact Analysis
- Cyber Security Compliance
- Security Auditing
- Security-Savvy Software Development
- Disaster Recovery
- Business Continuity Analysis
- Access Control
- Secure Use of Software
- Secure Performance
-
Computer Security
- Firewall Systems
- Hacking Techniques and Related Issues
- Intrusion Detection System (IDS)
- Honeypot
- Virus Issues (Detection, Prevention ...)
- Trusted Computing
- Alert Correlation
- Attack Graphs
- Incident Responding
- Malware Analysis
- Incident Responding
- Malware Analysis
- Intrusion Detection
-
Security Education
- Computer Security Education
- Network Security Education
- Cyber Security Education
- Cyber Security Body of Knowledge
- Information Assurance Education