Call for papers


SecureComm’10 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, applied cryptography) will also be considered if a clear connection to private or secure communications/networking is demonstrated.

The aim of SecureComm is to bring together security and privacy experts in academia, industry and government as well as practitioners, standards developers and policy makers, in order to engage in a discussion about common goals and explore important research directions in the field. SecureComm also serves as a venue for learning about state-of-the-art in security and privacy research, giving attendees the opportunity to network with experts in the field.

Selected papers will be published at a special issue of IJIS (International Journal of Information Security, Springer)

Instructions for authors

All submissions will be blind reviewed. The paper must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of keywords. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings.

SecureComm’10 proceedings will be published in Springer's LNICST Series, which is indexed by EI. The final proceedings version will be a paper of at most 18 pages in the llncs style, which corresponds to around 7000 words of text. The document submitted (excluding appendices) should correspond to what the authors expect to be published if their paper is accepted without modification. We therefore strongly recommend that authors check whether their paper (without appendices) will fit within the above llncs space constraints. Committee members are not required to review more than that, so the paper should be intelligible and self-contained within this length. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Authors of accepted papers must guarantee that their paper will be presented at the conference.

Workshops

Proposals for one-day workshops to be held in conjunction with the conference are solicited. A maximum of 2 page proposal should be submitted, including the workshop name, its scope and a list of topic of interests. Proposals should be submitted to Workshop Chair by April 5, 2010. (Check info in the ICST Conference Organizers’ Manual.)

Tutorials/Demos

Proposals for tutorials as well as demos are solicited. Please contact General Chair by May 31, 2010. (Check info in the ICST Conference Organizers’ Manual.)

Commitees

Conference Committees


Sign up for SecureComm Updates


Last modified: (none)