Call for Papers
You are invited to submit a full paper for consideration. All accepted papers will appear in the SAM'21 conference proceedings published by Springer Nature (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems. Those interested in proposing workshops/sessions, should refer to the "Call for Sessions/Workshops" section.
Accepted papers must be uploaded to the site that will be provided in the paper acceptance email. One of the authors must present the paper. In case of hesitation by some authors/speakers to travel during Year 2021 (due to Coronavirus/COVID-19), please click on the Non-Attendance Policy.
Topics of interest include, but are not limited to, the following:
-
Network Security
- Security Algorithms
- Mobile Network Security
- Security in CDN (Contents Distribution Networks)
- Virtual Private Network (VPN)
- Tracing Techniques in Internet
- Active Networks
- Security in Grid
- Web Monitoring
- Control Systems/SCADA Security
- Network Security Engineering
- Transport-Level Security
- Wireless Network Security
- IP Security
- Electronic Mail security
-
Cryptographic Technologies
- Security Protocols
- Key Management Techniques
- Cryptographic Technologies
- Applications of Block and Stream Ciphers
- Applications of Public Key Cryptology
- Message Authentication and Hash Functions
- Anonymity
- Digital Signature Schemes
- Secret Sharing
- Cryptanalysis
-
Security Management
- Surveillance Technologies
- Security Policies
- Security for Protocol Management
- Location Management
- QoS Management
- Resource Management
- Channel Management
- Mobility Management
- Digital Contents Copyright Protection
- System Security Management
- Network Security Management
- Management in Network Equipment
- Storage Area Networks (SAN) Management
- Information Security Management
- Government Security Policy
- Web Penetration Testing
- Security Operations
- Vulnerabilities Management
- Change and Patch Management
-
Security Applications
- Security in E-Commerce and M-Commerce
- Secure OS
- Watermarking
- High-Tech Systems at Airports
- Emerging Technologies and Applications
- Cloud Computing Security
- Database Security
- Data Mining Security
- Cyber Security Automation
-
Biometrics and Forensics
- Novel Biometric Methods
- Forensics
- Biological Security Technologies
- Face Recognition Systems
- Signature Recognition Systems
- Cyber Forensics
- Forensic Analysis
- Biometric Technologies for Security
- Feature Extraction and Matching Algorithms
-
Hardware Security
- Embedded Systems Security
- Cryptographic Processors and Co-Processors
- Security Architectures
- True and Pseudorandom Number Generators
- Side Channel Attacks
- Fault Attacks
- Hardware Tamper Resistance
- Smart Card Processors
- Secure Storage Devices
-
Information Assurance
- Mission Assurance
- Risk Assessment and Risk Management
- Continuity of Operations and Business Impact Analysis
- Cyber Security Compliance
- Security Auditing
- Security-Savvy Software Development
- Disaster Recovery
- Business Continuity Analysis
- Access Control
- Secure Use of Software
- Secure Performance
-
Computer Security
- Firewall Systems
- Hacking Techniques and Related Issues
- Intrusion Detection System (IDS)
- Honeypot
- Virus Issues (Detection, Prevention ...)
- Trusted Computing
- Alert Correlation
- Attack Graphs
- Incident Responding
- Malware Analysis
- Incident Responding
- Malware Analysis
- Intrusion Detection
-
Security Education
- Computer Security Education
- Network Security Education
- Cyber Security Education
- Cyber Security Body of Knowledge
- Information Assurance Education