Please visit the latest SSCC2014 website

Call for Papers

Instructions for Authors of Accepted Papers

Please revise your paper carefully according to the comments of the reviewers. Papers must be formatted according to the guidelines of Springer Communications in Computer and Information Science (CCIS) Series. Failure to do so may result in the exclusion of your paper from the proceedings. Please read the authors' instructions carefully before preparing your papers. Each paper is allowed to have 12 pages in the final camera-ready copy. At least one full paying author of each accepted paper must register for the conference before the deadline. 

Before uploading your camera ready paper, please:

  • Check that title and abstract in EDAS match your camera-ready paper exactly.
  • Please use Title Case for the paper title, i.e. capitalising all main words.
  • Compare all author names in EDAS with the author list in your paper. They MUST BE identical and in the same order.

This is very important because we will be using the information provided in EDAS to generate the final conference program and the table of contents for Springer Proceedings. Please note that the abstract and title should be readable stand-alone and not contain any references or unexplained acronyms. You are allowed to modify abstract and author list yourself. You cannot modify the title for the paper, please send a mail to if that is necessary and give a valid reason.

Important Steps
1. Upload your Camera ready paper (Final Manuscript) in PDF format on EDAS. 
2. Upload the source files of your camera ready paper (WORD or Latex) on EDAS. All Latex files should be submitted as a single zipped file. DOCX files are not accepted.

The camera ready paper should be formatted according to the Springer template. This template can be downloaded here:

3. Submit the copyright form in PDF or image formats from the "Copyright" column in the My papers table or the individual paper page of EDAS.
Each contribution must be accompanied by a Springer copyright form. One author may sign on behalf of all of the authors of a particular paper. In this case, the author signs for and accepts responsibility for releasing the material on behalf of any and all co-authors.

Download Copyright Form 

Please make sure that you have entered the following details in the copyright form:

  • Title of the Book/Volume/Conference:  International Symposium on Security in Computing and Communications (SSCC’13)
  • Volume Editors: S. M Thampi, C. Fan, P. K. Atrey, and G. M. Perez 
  • Title of Contribution: (Your Paper Title)
  • Author(s) name(s):
  • Corresponding Author's name, address, affiliation and e-mail:
  • Signature of Corresponding Author:

4. Complete your registration.

The online Registration Form can be accessed via

Call for Papers

The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. 

Authors should submit their papers online. We use EDAS system for managing submissions and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here. Submissions must be in Portable Document Format (.pdf). All submissions should be written in English with a maximum paper length of TWELVE (12). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Please compare all author names in EDAS with the author list in your paper. They must be identical and in the same order. 

Submitted papers will undergo a peer review process, coordinated by the Program Committee. Each manuscript will be reviewed by a minimum of three reviewers. Submission of a paper implies that, should the paper be accepted, at least one of the authors must register and present the paper at the conference. Acceptance of papers will be communicated to authors by email.

The symposium proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings.  Authors publishing in CCIS have to sign the Springer CCIS copyright transfer form, however, they are free to use their material published in CCIS for substantially changed, more elaborate subsequent publications elsewhere. For the preparation of the camera-ready papers/files, authors have to strictly adhere to the Springer CCIS Authors' Instructions.


Manuscript Template -  Word     Latex



The topics of interests include, but are not limited to:

Anti-Forensics Techniques
Application Security
Authentication and Access Control Systems
Critical Infrastructure Protection
Cyber Warfare Trends and Approaches
Denial-of-Service Attacks and Countermeasures
Digital Forensics
Digital Rights Management
Distributed and Pervasive Systems Security
Embedded Systems Security
Enterprise Systems Security
Executable Content and Content Filtering
File and Files System Security
Fraud Management
Hardware Security
Human-Computer Interaction and Security
Identity Management
Intellectual Property Protection
Key Distribution and Management
Mobile System Security
Multimedia and Document Security
Network Infrastructure Security
Operating Systems and Database Security
Peer-to-Peer Security
Secure Communications and Information Flow
Secure Sensor Networks
Security for Grid Computing
Security in Cloud Computing/Social Networks
Security in e-services
Security of Web-Based Applications
Surveillance Systems
VOIP, Wireless Network Security
Analysis of Network and Security Protocols
Authorship Analysis
Biometrics Standards and Standardization
Border Security
Business Continuity & Disaster Recovery Planning
Crowd Management
Emergency Response and Management
Encryption and Cryptography
Forecasting Terrorism
Incident Handling and Penetration Testing
Information Hiding
Intrusion and Anomaly Detection and Prevention
Investigation of Insider Attacks
Language-Based Security
Malware Forensics and Anti-Malware Techniques
Protocol Security
Secure Software Development
Security Architectures
Security Metrics
Self-Protecting and Self-Healing Systems
Social Engineering
Social Network Analysis
Template Protection and Liveliness Detection
Threats, Vulnerabilities, and Risk Management
Economics of Security
Laws and Regulations/Legal Issues
Security Policies and Trust Management
Security Education and Training
New Threats and Non-Traditional Approaches
Theories, Methods and Tools in Managing Security

Journal Special Issues

Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):


Important Dates (Last Updated on March 23, 2013)

Extended Submission Deadline: April 30, 2013  May 06, 2013
Notification of Decision: May 31, 2013
Proceedings Version Due: June 17, 2013
Author Registration Closes: June 21, 2013
Symposium: August 22-24, 2013