Call for Papers

The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.

The topics of interests include, but are not limited to:

  • Anti-Forensics Techniques
  • Application Security
  • Authentication and Access Control Systems
  • Critical Infrastructure Protection
  • Cyber Warfare Trends and Approaches
  • Denial-of-Service Attacks and Countermeasures
  • Digital Forensics
  • Digital Rights Management
  • Distributed and Pervasive Systems Security
  • Embedded Systems Security
  • Enterprise Systems Security
  • Executable Content and Content Filtering
  • File and Files System Security
  • Fraud Management
  • Hardware Security
  • Human-Computer Interaction and Security
  • Identity Management
  • Intellectual Property Protection
  • Key Distribution and Management
  • Mobile System Security
  • Multimedia and Document Security
  • Network Infrastructure Security
  • Operating Systems and Database Security
  • Peer-to-Peer Security
  • Secure Communications and Information Flow
  • Secure Sensor Networks
  • Security for Grid Computing
  • Security in Cloud Computing/Social Networks
  • Security in e-services
  • Security of Web-Based Applications
  • Surveillance Systems
  • Accountability
  • Anonymity
  • Analysis of Network and Security Protocols
  • Authorship Analysis
  • Biometrics Standards and Standardization
  • Border Security
  • Business Continuity & Disaster Recovery Planning
  • Crowd Management
  • Emergency Response and Management
  • Encryption and Cryptography
  • Forecasting Terrorism
  • Incident Handling and Penetration Testing
  • Information Hiding
  • Intrusion and Anomaly Detection and Prevention
  • Investigation of Insider Attacks
  • Language-Based Security
  • Malware Forensics and Anti-Malware Techniques
  • Protocol Security
  • Secure Software Development
  • Security Architectures
  • Security Metrics
  • Self-Protecting and Self-Healing Systems
  • Social Engineering
  • Social Network Analysis
  • Template Protection and Liveliness Detection
  • Threats, Vulnerabilities, and Risk Management
  • Economics of Security
  • Laws and Regulations/Legal Issues
  • Security Policies and Trust Management
  • Security Education and Training
  • New Threats and Non-Traditional Approaches
  • Theories, Methods and Tools in Managing Security

Special Session on Cloud Security and Cryptography
  • Accountability for Cloud Computing
  • Availability, Recovery and Auditing
  • Cloud Access Control and Key Management
  • Cloud-Centric Threat Models
  • Coding and Cryptography for Secure Cloud
  • Parallel and Dynamic Searchable Symmetric Encryption
  • Attribute-Based Encryption
  • Multi-Party Computation with Low Communication
  • Homomorphic Encryption
  • Cryptographic Cloud Storage
  • Randomness Testing of Modern Encryption Techniques
  • Evolution of Cloud Security Measures
  • Failure Detection and Prediction
  • Cloud Forensics
  • Identity Management in the Cloud
  • Integrity and Verifiable Computation
  • Privacy Preserving Technologies in Cloud Computing
  • Proofs of Storage
  • Remote Attestation Mechanisms in Clouds
  • Scalability of Security in Global-Size Clouds
  • Secure Cloud Architecture
  • Secure Computation Outsourcing
  • Secure Data Management
  • Secure Management of Virtualized Resources
  • Secure Mobile Cloud
  • Security for Emerging Cloud Programming Models
  • Secured Searching in Cloud Data
  • Trust and Policy Management in Clouds
  • Continuous Security Monitoring
  • New Cloud-Aware Web Service Security Paradigms and Mechanisms
  • Business and Security Risk Models and Clouds
  • Case Studies and Experimental Implementations

The symposium proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available both in book form and via the SpringerLink digital library. Thw volumes of this series are submitted for inclusion to the leading indexing services including DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, and Scopus.

Authors publishing in CCIS have to sign the Springer CCIS copyright transfer form, however, they are free to use their material published in CCIS for substantially changed, more elaborate subsequent publications elsewhere. For the preparation of the camera-ready papers/files, authors have to strictly adhere to the Springer CCIS Authors' Instructions.

Journal Special Issues

Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):

Important Dates

Full Paper Submission Ends April 14, 2015 09:29:00 IST (Extended)
Acceptance Notification May 23, 2015
Final Paper Deadline June 10, 2015
Author Registration Closes June 5, 2015


Hosted By