Call for Papers
You are invited to submit a full paper for consideration. All accepted papers will be published in the SAM'17 conference proceedings (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems. Those interested in proposing workshops/sessions, should refer to the "Call for Sessions/Workshops" section.
Topics of interest include, but are not limited to, the following:
- 
	Network Security
	
- Security Algorithms
 - Mobile Network Security
 - Security in CDN (Contents Distribution Networks)
 - Virtual Private Network (VPN)
 - Tracing Techniques in Internet
 - Active Networks
 - Security in Grid
 - Web Monitoring
 - Control Systems/SCADA Security
 - Network Security Engineering
 - Transport-Level Security
 - Wireless Network Security
 - IP Security
 - Electronic Mail security
 
 - 
	Cryptographic Technologies
	
- Security Protocols
 - Key Management Techniques
 - Cryptographic Technologies
 - Applications of Block and Stream Ciphers
 - Applications of Public Key Cryptology
 - Message Authentication and Hash Functions
 - Anonymity
 - Digital Signature Schemes
 - Secret Sharing
 - Cryptanalysis
 
 - 
	Security Management
	
- Surveillance Technologies
 - Security Policies
 - Security for Protocol Management
 - Location Management
 - QoS Management
 - Resource Management
 - Channel Management
 - Mobility Management
 - Digital Contents Copyright Protection
 - System Security Management
 - Network Security Management
 - Management in Network Equipment
 - Storage Area Networks (SAN) Management
 - Information Security Management
 - Government Security Policy
 - Web Penetration Testing
 - Security Operations
 - Vulnerabilities Management
 - Change and Patch Management
 
 - 
	Security Applications
	
- Security in E-Commerce and M-Commerce
 - Secure OS
 - Watermarking
 - High-Tech Systems at Airports
 - Emerging Technologies and Applications
 - Cloud Computing Security
 - Database Security
 - Data Mining Security
 - Cyber Security Automation
 
 - 
	Biometrics and Forensics
	
- Novel Biometric Methods
 - Forensics
 - Biological Security Technologies
 - Face Recognition Systems
 - Signature Recognition Systems
 - Cyber Forensics
 - Forensic Analysis
 - Biometric Technologies for Security
 - Feature Extraction and Matching Algorithms
 
 - 
	Hardware Security
	
- Embedded Systems Security
 - Cryptographic Processors and Co-Processors
 - Security Architectures
 - True and Pseudorandom Number Generators
 - Side Channel Attacks
 - Fault Attacks
 - Hardware Tamper Resistance
 - Smart Card Processors
 - Secure Storage Devices
 
 - 
	Information Assurance
	
- Mission Assurance
 - Risk Assessment and Risk Management
 - Continuity of Operations and Business Impact Analysis
 - Cyber Security Compliance
 - Security Auditing
 - Security-Savvy Software Development
 - Disaster Recovery
 - Business Continuity Analysis
 - Access Control
 - Secure Use of Software
 - Secure Performance
 
 - 
	Computer Security
	
- Firewall Systems
 - Hacking Techniques and Related Issues
 - Intrusion Detection System (IDS)
 - Honeypot
 - Virus Issues (Detection, Prevention ...)
 - Trusted Computing
 - Alert Correlation
 - Attack Graphs
 - Incident Responding
 - Malware Analysis
 - Incident Responding
 - Malware Analysis
 - Intrusion Detection
 
 - 
	Security Education
	
- Computer Security Education
 - Network Security Education
 - Cyber Security Education
 - Cyber Security Body of Knowledge
 - Information Assurance Education
 
 

