Slide #1 image

Registration

In order to be included in the conference, at least one author per accepted paper/poster must register for the conference.

Register

Paper Submission:

Prospective authors are invited to submit their papers by uploading them to the evaluation website (EasyChair). If you have not used EasyChair before, please create a new account first. To upload your paper, login and click "New Submission" at the top.

The first page of the draft paper should include: title of the paper, name, affiliation, postal address, email address for each author, and the track(s) that the paper is addressing. The first page should also identify the name of the contact author and a maximum of five topical keywords that would best represent the content of the paper.

Slide #3 image

Important Dates:

May 15, 2017: Submission of full papers (about 7 pages) (Extended)
May 25, 2017: Notification of acceptance (+/- two days)
June 5, 2017: Final papers + Copyright + Registration
July 17-20, 2017: The 2017 World Congress in Computer Science, Computer Engineering and Applied Computing

NextPrev

 

Call for Papers

You are invited to submit a full paper for consideration. All accepted papers will be published in the SAM'17 conference proceedings (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems. Those interested in proposing workshops/sessions, should refer to the "Call for Sessions/Workshops" section.

Topics of interest include, but are not limited to, the following:

  • Network Security
    • Security Algorithms
    • Mobile Network Security
    • Security in CDN (Contents Distribution Networks)
    • Virtual Private Network (VPN)
    • Tracing Techniques in Internet
    • Active Networks
    • Security in Grid
    • Web Monitoring
    • Control Systems/SCADA Security
    • Network Security Engineering
    • Transport-Level Security
    • Wireless Network Security
    • IP Security
    • Electronic Mail security
  • Cryptographic Technologies
    • Security Protocols
    • Key Management Techniques
    • Cryptographic Technologies
    • Applications of Block and Stream Ciphers
    • Applications of Public Key Cryptology
    • Message Authentication and Hash Functions
    • Anonymity
    • Digital Signature Schemes
    • Secret Sharing
    • Cryptanalysis
  • Security Management
    • Surveillance Technologies
    • Security Policies
    • Security for Protocol Management
    • Location Management
    • QoS Management
    • Resource Management
    • Channel Management
    • Mobility Management
    • Digital Contents Copyright Protection
    • System Security Management
    • Network Security Management
    • Management in Network Equipment
    • Storage Area Networks (SAN) Management
    • Information Security Management
    • Government Security Policy
    • Web Penetration Testing
    • Security Operations
    • Vulnerabilities Management
    • Change and Patch Management
  • Security Applications
    • Security in E-Commerce and M-Commerce
    • Secure OS
    • Watermarking
    • High-Tech Systems at Airports
    • Emerging Technologies and Applications
    • Cloud Computing Security
    • Database Security
    • Data Mining Security
    • Cyber Security Automation
  • Biometrics and Forensics
    • Novel Biometric Methods
    • Forensics
    • Biological Security Technologies
    • Face Recognition Systems
    • Signature Recognition Systems
    • Cyber Forensics
    • Forensic Analysis
    • Biometric Technologies for Security
    • Feature Extraction and Matching Algorithms
  • Hardware Security
    • Embedded Systems Security
    • Cryptographic Processors and Co-Processors
    • Security Architectures
    • True and Pseudorandom Number Generators
    • Side Channel Attacks
    • Fault Attacks
    • Hardware Tamper Resistance
    • Smart Card Processors
    • Secure Storage Devices
  • Information Assurance
    • Mission Assurance
    • Risk Assessment and Risk Management
    • Continuity of Operations and Business Impact Analysis
    • Cyber Security Compliance
    • Security Auditing
    • Security-Savvy Software Development
    • Disaster Recovery
    • Business Continuity Analysis
    • Access Control
    • Secure Use of Software
    • Secure Performance
  • Computer Security
    • Firewall Systems
    • Hacking Techniques and Related Issues
    • Intrusion Detection System (IDS)
    • Honeypot
    • Virus Issues (Detection, Prevention ...)
    • Trusted Computing
    • Alert Correlation
    • Attack Graphs
    • Incident Responding
    • Malware Analysis
    • Incident Responding
    • Malware Analysis
    • Intrusion Detection
  • Security Education
    • Computer Security Education
    • Network Security Education
    • Cyber Security Education
    • Cyber Security Body of Knowledge
    • Information Assurance Education