(mobo import Concept___Event_For_Confident-migrated) |
Curator 91 (talk | contribs) |
||
(6 intermediate revisions by one other user not shown) | |||
Line 2: | Line 2: | ||
|Acronym=SecureComm 2020 | |Acronym=SecureComm 2020 | ||
|Title=16th EAI International Conference on Security and Privacy in Communication Networks | |Title=16th EAI International Conference on Security and Privacy in Communication Networks | ||
+ | |In Event Series=Event Series:SecureComm | ||
+ | |Single Day Event=no | ||
+ | |Start Date=2020/10/21 | ||
+ | |End Date=2020/10/23 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=on site | ||
+ | |City=Washington | ||
+ | |Region=DC | ||
+ | |Country=Country:US | ||
+ | |Official Website=http://securecomm.org/ | ||
+ | |Registration Link=https://services.eai.eu/s/registration-faq.html | ||
+ | |DOI=10.25798/61b0-vx68 | ||
|Type=Conference | |Type=Conference | ||
− | |||
− | |||
|Twitter account=https://twitter.com/eai_social | |Twitter account=https://twitter.com/eai_social | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|Has coordinator=Hemant Purohit | |Has coordinator=Hemant Purohit | ||
|has general chair=Kun Sun, Sara Foresti | |has general chair=Kun Sun, Sara Foresti | ||
Line 20: | Line 22: | ||
|has OC member=Massimiliano Albanese | |has OC member=Massimiliano Albanese | ||
|has tutorial chair=Fabio Scotti | |has tutorial chair=Fabio Scotti | ||
− | |||
|pageCreator=User:Curator 39 | |pageCreator=User:Curator 39 | ||
|pageEditor=User:Curator 39 | |pageEditor=User:Curator 39 | ||
|contributionType=1 | |contributionType=1 | ||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
+ | {{Event Deadline | ||
+ | |Notification Deadline=2020/06/26 | ||
+ | |Camera-Ready Deadline=2020/08/16 | ||
+ | |Workshop Deadline=2020/04/28 | ||
+ | |Tutorial Deadline=2020/05/05 | ||
+ | |Submission Deadline=2020/05/04 | ||
+ | }} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=European Alliance for Innovation | ||
+ | }} | ||
+ | {{Event Metric}} | ||
+ | {{S Event}} | ||
==Topics== | ==Topics== | ||
Topics of interest include, but are not limited to the following: | Topics of interest include, but are not limited to the following: | ||
− | |||
− | * | + | *Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks |
− | * | + | *Security & Privacy in the Internet of Things (IoT) |
− | * | + | *Security & Privacy in Cyber-Physical Systems (CPS) |
− | * | + | *Security & Privacy in next-generation communication systems (e.g., VoIP, 5G) |
− | * | + | *Secure applications of blockchain technology |
− | * | + | *Network Intrusion Detection and Prevention, Firewalls, Packet Filters |
− | * | + | *Malware Analysis and Detection including Botnets, Trojans and APTs |
− | * | + | *Web and Systems Security |
− | * | + | *Distributed Denial of Service Attacks and Defenses |
− | * | + | *Communication Privacy and Anonymity |
− | * | + | *Circumvention and Anti-Censorship Technologies |
− | * | + | *Network and Internet Forensics Techniques |
− | * | + | *Authentication Systems: Public Key |
− | * | + | *Infrastructures, Key Management, Credential Management |
− | * | + | *Secure Routing, Naming/Addressing, Network Management |
− | * | + | *Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs |
− | * | + | *Security & Privacy in Peer-to-Peer and Overlay Networks |
− | * | + | *Security & Isolation in Cloud, Data Center and Software-Defined Networks |
==About SecureComm 2020== | ==About SecureComm 2020== | ||
SecureComm seeks high-quality research contributions, which have not been previously published or in parallel submission to another conference or journal. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. | SecureComm seeks high-quality research contributions, which have not been previously published or in parallel submission to another conference or journal. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. |
Latest revision as of 08:57, 5 August 2023
Deadlines
|
||
Workshop |
|
||
Submission |
|
||
Tutorial |
|
||
Notification |
|
||
Camera-Ready |
Metrics
Venue
Washington, DC, United States of America
Warning: Venue is missing. The map might not show the exact location.
Topics
Topics of interest include, but are not limited to the following:
- Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
- Security & Privacy in the Internet of Things (IoT)
- Security & Privacy in Cyber-Physical Systems (CPS)
- Security & Privacy in next-generation communication systems (e.g., VoIP, 5G)
- Secure applications of blockchain technology
- Network Intrusion Detection and Prevention, Firewalls, Packet Filters
- Malware Analysis and Detection including Botnets, Trojans and APTs
- Web and Systems Security
- Distributed Denial of Service Attacks and Defenses
- Communication Privacy and Anonymity
- Circumvention and Anti-Censorship Technologies
- Network and Internet Forensics Techniques
- Authentication Systems: Public Key
- Infrastructures, Key Management, Credential Management
- Secure Routing, Naming/Addressing, Network Management
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
- Security & Privacy in Peer-to-Peer and Overlay Networks
- Security & Isolation in Cloud, Data Center and Software-Defined Networks
About SecureComm 2020
SecureComm seeks high-quality research contributions, which have not been previously published or in parallel submission to another conference or journal. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.