NordSec 2015 |
||
NordSec 2015The 20th Nordic Conference on Secure IT Systems will be held at KTH Royal Institute of Technology, in Stockholm, Sweden, October 19-21, 2015. NordSec addresses a broad range of topics within IT security with the aims of bringing together computer security researchers and encourage interaction between academia and industry. NordSec 2015 welcomes contributions within, but not limited to, the following areas:
Applied cryptography Communication and network security Network and web security Security in Internet of Things, M2M Cloud security Operating system security Software security Language-based techniques for security Security protocols Access control and security models Privacy and privacy-enhancing technologies Trust and reputation management Security evaluation and measurements Commercial security policies and enforcement Computer crime and cyber forensics Cyber warfare Social engineering and phishing Intrusion detection Security management and audit New ideas and paradigms in security Usable security and privacy Vulnerability testing Hardware security Enterprise security Contributions should reflect original research, developments, studies and experience. Full papers should not exceed 16 pages (including references and appendices) in the Springer LNCS format, short papers up to 8 pages; the proceedings will be published in the Lecture Notes in Computer Science. Poster or demo descriptions should be up to 2 pages, industry contributions up to 6 pages. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submitted papers will be judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to make a good-faith effort to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Minimally, please take the following steps when preparing your submission: Remove the names and affiliations of authors from the title page. Remove acknowledgment of identifying names and funding sources. Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author. Important Dates
ContactThe conference is co-chaired by Sonja Buchegger and Mads Dam, KTH Royal Institute of Technology. Please send e-mail to nordsec2015@csc.kth.se if you have any questions. Photo credit: CC by-nc-sa 2.0, Peter Szekely, http://tinyurl.com/mnj73e2 |
|