Call for Papers

You are invited to submit a full paper for consideration. All accepted papers will be published in the SAM'16 conference proceedings (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems. Those interested in proposing workshops/sessions, should refer to the "Call for Sessions/Workshops" section.

Topics of interest include, but are not limited to, the following:

  • Network Security
    • Security Algorithms
    • Mobile Network Security
    • Security in CDN (Contents Distribution Networks)
    • Virtual Private Network (VPN)
    • Tracing Techniques in Internet
    • Active Networks
    • Security in Grid
    • Web Monitoring
    • Control Systems/SCADA Security
    • Network Security Engineering
    • Transport-Level Security
    • Wireless Network Security
    • IP Security
    • Electronic Mail security
  • Cryptographic Technologies
    • Security Protocols
    • Key Management Techniques
    • Cryptographic Technologies
    • Applications of Block and Stream Ciphers
    • Applications of Public Key Cryptology
    • Message Authentication and Hash Functions
    • Anonymity
    • Digital Signature Schemes
    • Secret Sharing
    • Cryptanalysis
  • Security Management
    • Surveillance Technologies
    • Security Policies
    • Security for Protocol Management
    • Location Management
    • QoS Management
    • Resource Management
    • Channel Management
    • Mobility Management
    • Digital Contents Copyright Protection
    • System Security Management
    • Network Security Management
    • Management in Network Equipment
    • Storage Area Networks (SAN) Management
    • Information Security Management
    • Government Security Policy
    • Web Penetration Testing
    • Security Operations
    • Vulnerabilities Management
    • Change and Patch Management
  • Security Applications
    • Security in E-Commerce and M-Commerce
    • Secure OS
    • Watermarking
    • High-Tech Systems at Airports
    • Emerging Technologies and Applications
    • Cloud Computing Security
    • Database Security
    • Data Mining Security
    • Cyber Security Automation
  • Biometrics and Forensics
    • Novel Biometric Methods
    • Forensics
    • Biological Security Technologies
    • Face Recognition Systems
    • Signature Recognition Systems
    • Cyber Forensics
    • Forensic Analysis
    • Biometric Technologies for Security
    • Feature Extraction and Matching Algorithms
  • Hardware Security
    • Embedded Systems Security
    • Cryptographic Processors and Co-Processors
    • Security Architectures
    • True and Pseudorandom Number Generators
    • Side Channel Attacks
    • Fault Attacks
    • Hardware Tamper Resistance
    • Smart Card Processors
    • Secure Storage Devices
  • Information Assurance
    • Mission Assurance
    • Risk Assessment and Risk Management
    • Continuity of Operations and Business Impact Analysis
    • Cyber Security Compliance
    • Security Auditing
    • Security-Savvy Software Development
    • Disaster Recovery
    • Business Continuity Analysis
    • Access Control
    • Secure Use of Software
    • Secure Performance
  • Computer Security
    • Firewall Systems
    • Hacking Techniques and Related Issues
    • Intrusion Detection System (IDS)
    • Honeypot
    • Virus Issues (Detection, Prevention ...)
    • Trusted Computing
    • Alert Correlation
    • Attack Graphs
    • Incident Responding
    • Malware Analysis
    • Incident Responding
    • Malware Analysis
    • Intrusion Detection
  • Security Education
    • Computer Security Education
    • Network Security Education
    • Cyber Security Education
    • Cyber Security Body of Knowledge
    • Information Assurance Education