Call for Papers
The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.
SSCC'19 Maintrack |
- Anti-Forensics Techniques
- Application Security
- Authentication and Access Control Systems
- Critical Infrastructure Protection
- Cyber Warfare Trends and Approaches
- Denial-of-Service Attacks and Countermeasures
- Digital Forensics
- Digital Rights Management
- Distributed and Pervasive Systems Security
- Embedded Systems Security
- Enterprise Systems Security
- Executable Content and Content Filtering
- File and Files System Security
- Fraud Management
- Hardware Security
- Human-Computer Interaction and Security
- Identity Management
- Intellectual Property Protection
- Key Distribution and Management
- Mobile System Security
- Multimedia and Document Security
- Network Infrastructure Security
- Operating Systems and Database Security
- Peer-to-Peer Security
- Secure Communications and Information Flow
- Secure Sensor Networks
- Security for Grid Computing
- Security in Cloud and Edge Computing/Social Networks
- Security in e-services
- Security of Web-Based Applications
- Surveillance Systems
- Accountability
- Anonymity
|
- Analysis of Network and Security Protocols
- Authorship Analysis
- Biometrics Standards and Standardization
- Border Security
- Business Continuity & Disaster Recovery Planning
- Crowd Management
- Emergency Response and Management
- Encryption and Cryptography
- Forecasting Terrorism
- Incident Handling and Penetration Testing
- Information Hiding
- Intrusion and Anomaly Detection and Prevention
- Investigation of Insider Attacks
- Language-Based Security
- Malware Forensics and Anti-Malware Techniques
- Protocol Security
- Secure Software Development
- Security Architectures
- Security Metrics
- Self-Protecting and Self-Healing Systems
- Social Engineering
- Social Network Analysis
- Template Protection and Liveliness Detection
- Threats, Vulnerabilities, and Risk Management
- Economics of Security
- Laws and Regulations/Legal Issues
- Security Policies and Trust Management
- Security Education and Training
- New Threats and Non-Traditional Approaches
- Theories, Methods and Tools in Managing Security
|
Special Session 1: Cloud Security and Cryptography |
- Accountability for Cloud Computing
- Availability, Recovery and Auditing
- Cloud Access Control and Key Management
- Cloud-Centric Threat Models
- Coding and Cryptography for Secure Cloud
- Parallel and Dynamic Searchable Symmetric Encryption
- Attribute-Based Encryption
- Multi-Party Computation with Low Communication
- Homomorphic Encryption
- Cryptographic Cloud Storage
- Randomness Testing of Modern Encryption Techniques
- Evolution of Cloud Security Measures
- Failure Detection and Prediction
- Cloud Forensics
- Identity Management in the Cloud
- Integrity and Verifiable Computation
|
- Privacy Preserving Technologies in Cloud Computing
- Proofs of Storage
- Remote Attestation Mechanisms in Clouds
- Scalability of Security in Global-Size Clouds
- Secure Cloud Architecture
- Secure Computation Outsourcing
- Secure Data Management
- Secure Management of Virtualized Resources
- Secure Mobile Cloud
- Security for Emerging Cloud Programming Models
- Secured Searching in Cloud Data
- Trust and Policy Management in Clouds
- Continuous Security Monitoring
- New Cloud-Aware Web Service Security Paradigms and Mechanisms
- Business and Security Risk Models and Clouds
- Case Studies and Experimental Implementations
|
Special Session 2: Internet of Things Security and Privacy |
- Adaptive Security in IoT
- Attack Strategies for IoT
- Authentication and Access Control in IoT
- Cyber Attacks Detection and Prevention
- Cyber Physical Systems Security
- Data Analysis and Visualization for IoT
- Ethics and Legal Considerations in IoT
- Identification and Biometrics in IoT
- Identity Management in IoT
- Intrusion and Malware Detection
- Liability and Policy Enforcement in IoT
- Methods for IoT Security Analysis and Audit
- Privacy and Anonymization Techniques in IoT
|
- Reliable Interactions with Network Services
- Scalability and Robustness for Internet of Things
- Secure Cloud of Things
- Secure Mobile Applications
- Secure Mobility Management
- Secure Operating Systems
- Security Architectures
- Security in Wireless Sensor Networks
- Security of Big Data in IoT
- Security, Privacy and Trust in IoT
- System and Data Integrity
- Threat Models in IoT
- Trust Management Architectures
- Trustworthiness in IoT
|
Special Session 3: Big Data Security and Privacy
|
- Access Control of Big Data
- Anonymous Communication in Big Data
- Application Level Security and Privacy in Big Data
- Attacks and Counter Measures in Big Data
- Big Data Forensics
- Big Data Privacy Policies and Standards
- Biometric Security and Forensics in Big Data
- Cryptography and Big Data
- Data Protection, Integrity Standards and Policies
- Encrypted Information Retrieval in Big Data
- Identity Management and Key Management in Big Data
|
- Managing User Access for Big Data
- Network Security, Privacy in Big Data
- Physical Layer Security in Big Data
- Reliability and Availability in Big Data
- Scalability and Auditing For Big Data
- Secure Cross-Layer Design in Big Data
- Secure Quantum Communications
- Security and Legislative Impacts for Big Data
- Storage and System Security for Big Data
- Threat and Vulnerability Analysis in Big Data
- Trust in Big Data
- Visualizing Large Scale Security Data
|
Special Session 4: Secure Network Protocols
|
- Vulnerabilities of Existing Protocols and Applications
- Design of New Secure or Resilient Network Protocols
- Security Enhancements to Existing Networking Protocols
- Deployment Study of Secure Protocols on the Internet
- Security in Future Internet Architectures
- Key Distribution/Management
|
- Intrusion Detection and Response
- Incentive Systems for P2P Systems and MANET Routing
- Secure Protocol Configuration and Deployment
- Challenges and Security Protocols for Social Networks
- Secure Channel Establishment in Disadvantaged Networks
- Network Forensics
|
Special Session 5: Blockchain Security and Privacy
|
- Anonymity, Deanonymization and Privacy in Blockchain Systems
- Compact Ring Signatures
- Cyber-Infrastructures for Blockchain Systems
- Defences and Countermeasures
- Digital Preservation of Blockchain Records
- Economic, Monetary, Legal, Ethical, and Societal Aspects
- Formal Verification of Smart Contracts
- Fraud Detection and Financial Crime Prevention
|
- Compact Range Proofs
- Blockchain Cryptographic Primitives
- Incentive Mechanisms for Blockchains
- New Threat Models and Attacks
- Platforms for Decentralized Consensus
- Privacy-Preserving Signature Aggregation
- Provenance and Trust in Blockchain Systems
- Regulation and Law Enforcement
- Scalability Issues and Solutions
- Trust Models and Trust Management in Blockchain Systems
|