Call for Papers

Papers Due April 25, 2018
Acceptance Notification June 30, 2018
Final Paper Deadline July 20, 2018

The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.

SSCC'18 Maintrack   Special Session 1: Cloud Security and Cryptography  
Special Session 2: Internet of Things Security and Privacy   Special Session 3: Big Data Security and Privacy  
Special Session 4: Secure Network Protocols    Special Session 5: Blockchain Security and Privacy   

SSCC'18 Maintrack
  • Anti-Forensics Techniques
  • Application Security
  • Authentication and Access Control Systems
  • Critical Infrastructure Protection
  • Cyber Warfare Trends and Approaches
  • Denial-of-Service Attacks and Countermeasures
  • Digital Forensics
  • Digital Rights Management
  • Distributed and Pervasive Systems Security
  • Embedded Systems Security
  • Enterprise Systems Security
  • Executable Content and Content Filtering
  • File and Files System Security
  • Fraud Management
  • Hardware Security
  • Human-Computer Interaction and Security
  • Identity Management
  • Intellectual Property Protection
  • Key Distribution and Management
  • Mobile System Security
  • Multimedia and Document Security
  • Network Infrastructure Security
  • Operating Systems and Database Security
  • Peer-to-Peer Security
  • Secure Communications and Information Flow
  • Secure Sensor Networks
  • Security for Grid Computing
  • Security in Cloud Computing/Social Networks
  • Security in e-services
  • Security of Web-Based Applications
  • Surveillance Systems
  • Accountability
  • Anonymity
  • Analysis of Network and Security Protocols
  • Authorship Analysis
  • Biometrics Standards and Standardization
  • Border Security
  • Business Continuity & Disaster Recovery Planning
  • Crowd Management
  • Emergency Response and Management
  • Encryption and Cryptography
  • Forecasting Terrorism
  • Incident Handling and Penetration Testing
  • Information Hiding
  • Intrusion and Anomaly Detection and Prevention
  • Investigation of Insider Attacks
  • Language-Based Security
  • Malware Forensics and Anti-Malware Techniques
  • Protocol Security
  • Secure Software Development
  • Security Architectures
  • Security Metrics
  • Self-Protecting and Self-Healing Systems
  • Social Engineering
  • Social Network Analysis
  • Template Protection and Liveliness Detection
  • Threats, Vulnerabilities, and Risk Management
  • Economics of Security
  • Laws and Regulations/Legal Issues
  • Security Policies and Trust Management
  • Security Education and Training
  • New Threats and Non-Traditional Approaches
  • Theories, Methods and Tools in Managing Security

Special Session 1: Cloud Security and Cryptography
  • Accountability for Cloud Computing
  • Availability, Recovery and Auditing
  • Cloud Access Control and Key Management
  • Cloud-Centric Threat Models
  • Coding and Cryptography for Secure Cloud
  • Parallel and Dynamic Searchable Symmetric Encryption
  • Attribute-Based Encryption
  • Multi-Party Computation with Low Communication
  • Homomorphic Encryption
  • Cryptographic Cloud Storage
  • Randomness Testing of Modern Encryption Techniques
  • Evolution of Cloud Security Measures
  • Failure Detection and Prediction
  • Cloud Forensics
  • Identity Management in the Cloud
  • Integrity and Verifiable Computation
  • Privacy Preserving Technologies in Cloud Computing
  • Proofs of Storage
  • Remote Attestation Mechanisms in Clouds
  • Scalability of Security in Global-Size Clouds
  • Secure Cloud Architecture
  • Secure Computation Outsourcing
  • Secure Data Management
  • Secure Management of Virtualized Resources
  • Secure Mobile Cloud
  • Security for Emerging Cloud Programming Models
  • Secured Searching in Cloud Data
  • Trust and Policy Management in Clouds
  • Continuous Security Monitoring
  • New Cloud-Aware Web Service Security Paradigms and Mechanisms
  • Business and Security Risk Models and Clouds
  • Case Studies and Experimental Implementations

Special Session 2: Internet of Things Security and Privacy
  • Adaptive Security in IoT
  • Attack Strategies for IoT
  • Authentication and Access Control in IoT
  • Cyber Attacks Detection and Prevention
  • Cyber Physical Systems Security
  • Data Analysis and Visualization for IoT
  • Ethics and Legal Considerations in IoT
  • Identification and Biometrics in IoT
  • Identity Management in IoT
  • Intrusion and Malware Detection
  • Liability and Policy Enforcement in IoT
  • Methods for IoT Security Analysis and Audit
  • Privacy and Anonymization Techniques in IoT
  • Reliable Interactions with Network Services
  • Scalability and Robustness for Internet of Things
  • Secure Cloud of Things
  • Secure Mobile Applications
  • Secure Mobility Management
  • Secure Operating Systems
  • Security Architectures
  • Security in Wireless Sensor Networks
  • Security of Big Data in IoT
  • Security, Privacy and Trust in IoT
  • System and Data Integrity
  • Threat Models in IoT
  • Trust Management Architectures
  • Trustworthiness in IoT

Special Session 3: Big Data Security and Privacy
  • Access Control of Big Data
  • Anonymous Communication in Big Data
  • Application Level Security and Privacy in Big Data
  • Attacks and Counter Measures in Big Data
  • Big Data Forensics
  • Big Data Privacy Policies and Standards
  • Biometric Security and Forensics in Big Data
  • Cryptography and Big Data
  • Data Protection, Integrity Standards and Policies
  • Encrypted Information Retrieval in Big Data
  • Identity Management and Key Management in Big Data
  • Managing User Access for Big Data
  • Network Security, Privacy in Big Data
  • Physical Layer Security in Big Data
  • Reliability and Availability in Big Data
  • Scalability and Auditing For Big Data
  • Secure Cross-Layer Design in Big Data
  • Secure Quantum Communications
  • Security and Legislative Impacts for Big Data
  • Storage and System Security for Big Data
  • Threat and Vulnerability Analysis in Big Data
  • Trust in Big Data
  • Visualizing Large Scale Security Data

Special Session 4: Secure Network Protocols
  • Vulnerabilities of Existing Protocols and Applications
  • Design of New Secure or Resilient Network Protocols
  • Security Enhancements to Existing Networking Protocols
  • Deployment Study of Secure Protocols on the Internet
  • Security in Future Internet Architectures
  • Key Distribution/Management
  • Intrusion Detection and Response
  • Incentive Systems for P2P Systems and MANET Routing
  • Secure Protocol Configuration and Deployment
  • Challenges and Security Protocols for Social Networks
  • Secure Channel Establishment in Disadvantaged Networks
  • Network Forensics

Special Session 5: Blockchain Security and Privacy
  • Anonymity, Deanonymization and Privacy in Blockchain Systems
  • Compact Ring Signatures
  • Cyber-Infrastructures for Blockchain Systems
  • Defences and Countermeasures
  • Digital Preservation of Blockchain Records
  • Economic, Monetary, Legal, Ethical, and Societal Aspects
  • Formal Verification of Smart Contracts
  • Fraud Detection and Financial Crime Prevention
  • Compact Range Proofs
  • Blockchain Cryptographic Primitives
  • Incentive Mechanisms for Blockchains
  • New Threat Models and Attacks
  • Platforms for Decentralized Consensus
  • Privacy-Preserving Signature Aggregation
  • Provenance and Trust in Blockchain Systems
  • Regulation and Law Enforcement
  • Scalability Issues and Solutions
  • Trust Models and Trust Management in Blockchain Systems

The symposium proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library. The volumes of this series are submitted for inclusion to the leading indexing services including DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, and Scopus.

Authors publishing in CCIS have to sign the Springer CCIS copyright transfer form, however, they are free to use their material published in CCIS for substantially changed, more elaborate subsequent publications elsewhere. For the preparation of the camera-ready papers/files, authors have to strictly adhere to the Springer CCIS Authors' Instructions.

Journal Special Issues

Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):