Call for Papers

The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.

SSCC'19 Maintrack   Special Session 1: Cloud Security and Cryptography  
Special Session 2: Internet of Things Security and Privacy   Special Session 3: Big Data Security and Privacy  
Special Session 4: Secure Network Protocols    Special Session 5: Blockchain Security and Privacy   

SSCC'19 Maintrack
  • Anti-Forensics Techniques
  • Application Security
  • Authentication and Access Control Systems
  • Critical Infrastructure Protection
  • Cyber Warfare Trends and Approaches
  • Denial-of-Service Attacks and Countermeasures
  • Digital Forensics
  • Digital Rights Management
  • Distributed and Pervasive Systems Security
  • Embedded Systems Security
  • Enterprise Systems Security
  • Executable Content and Content Filtering
  • File and Files System Security
  • Fraud Management
  • Hardware Security
  • Human-Computer Interaction and Security
  • Identity Management
  • Intellectual Property Protection
  • Key Distribution and Management
  • Mobile System Security
  • Multimedia and Document Security
  • Network Infrastructure Security
  • Operating Systems and Database Security
  • Peer-to-Peer Security
  • Secure Communications and Information Flow
  • Secure Sensor Networks
  • Security for Grid Computing
  • Security in Cloud and Edge Computing/Social Networks
  • Security in e-services
  • Security of Web-Based Applications
  • Surveillance Systems
  • Accountability
  • Anonymity
  • Analysis of Network and Security Protocols
  • Authorship Analysis
  • Biometrics Standards and Standardization
  • Border Security
  • Business Continuity & Disaster Recovery Planning
  • Crowd Management
  • Emergency Response and Management
  • Encryption and Cryptography
  • Forecasting Terrorism
  • Incident Handling and Penetration Testing
  • Information Hiding
  • Intrusion and Anomaly Detection and Prevention
  • Investigation of Insider Attacks
  • Language-Based Security
  • Malware Forensics and Anti-Malware Techniques
  • Protocol Security
  • Secure Software Development
  • Security Architectures
  • Security Metrics
  • Self-Protecting and Self-Healing Systems
  • Social Engineering
  • Social Network Analysis
  • Template Protection and Liveliness Detection
  • Threats, Vulnerabilities, and Risk Management
  • Economics of Security
  • Laws and Regulations/Legal Issues
  • Security Policies and Trust Management
  • Security Education and Training
  • New Threats and Non-Traditional Approaches
  • Theories, Methods and Tools in Managing Security

Special Session 1: Cloud Security and Cryptography
  • Accountability for Cloud Computing
  • Availability, Recovery and Auditing
  • Cloud Access Control and Key Management
  • Cloud-Centric Threat Models
  • Coding and Cryptography for Secure Cloud
  • Parallel and Dynamic Searchable Symmetric Encryption
  • Attribute-Based Encryption
  • Multi-Party Computation with Low Communication
  • Homomorphic Encryption
  • Cryptographic Cloud Storage
  • Randomness Testing of Modern Encryption Techniques
  • Evolution of Cloud Security Measures
  • Failure Detection and Prediction
  • Cloud Forensics
  • Identity Management in the Cloud
  • Integrity and Verifiable Computation
  • Privacy Preserving Technologies in Cloud Computing
  • Proofs of Storage
  • Remote Attestation Mechanisms in Clouds
  • Scalability of Security in Global-Size Clouds
  • Secure Cloud Architecture
  • Secure Computation Outsourcing
  • Secure Data Management
  • Secure Management of Virtualized Resources
  • Secure Mobile Cloud
  • Security for Emerging Cloud Programming Models
  • Secured Searching in Cloud Data
  • Trust and Policy Management in Clouds
  • Continuous Security Monitoring
  • New Cloud-Aware Web Service Security Paradigms and Mechanisms
  • Business and Security Risk Models and Clouds
  • Case Studies and Experimental Implementations

Special Session 2: Internet of Things Security and Privacy
  • Adaptive Security in IoT
  • Attack Strategies for IoT
  • Authentication and Access Control in IoT
  • Cyber Attacks Detection and Prevention
  • Cyber Physical Systems Security
  • Data Analysis and Visualization for IoT
  • Ethics and Legal Considerations in IoT
  • Identification and Biometrics in IoT
  • Identity Management in IoT
  • Intrusion and Malware Detection
  • Liability and Policy Enforcement in IoT
  • Methods for IoT Security Analysis and Audit
  • Privacy and Anonymization Techniques in IoT
  • Reliable Interactions with Network Services
  • Scalability and Robustness for Internet of Things
  • Secure Cloud of Things
  • Secure Mobile Applications
  • Secure Mobility Management
  • Secure Operating Systems
  • Security Architectures
  • Security in Wireless Sensor Networks
  • Security of Big Data in IoT
  • Security, Privacy and Trust in IoT
  • System and Data Integrity
  • Threat Models in IoT
  • Trust Management Architectures
  • Trustworthiness in IoT

Special Session 3: Big Data Security and Privacy
  • Access Control of Big Data
  • Anonymous Communication in Big Data
  • Application Level Security and Privacy in Big Data
  • Attacks and Counter Measures in Big Data
  • Big Data Forensics
  • Big Data Privacy Policies and Standards
  • Biometric Security and Forensics in Big Data
  • Cryptography and Big Data
  • Data Protection, Integrity Standards and Policies
  • Encrypted Information Retrieval in Big Data
  • Identity Management and Key Management in Big Data
  • Managing User Access for Big Data
  • Network Security, Privacy in Big Data
  • Physical Layer Security in Big Data
  • Reliability and Availability in Big Data
  • Scalability and Auditing For Big Data
  • Secure Cross-Layer Design in Big Data
  • Secure Quantum Communications
  • Security and Legislative Impacts for Big Data
  • Storage and System Security for Big Data
  • Threat and Vulnerability Analysis in Big Data
  • Trust in Big Data
  • Visualizing Large Scale Security Data

Special Session 4: Secure Network Protocols
  • Vulnerabilities of Existing Protocols and Applications
  • Design of New Secure or Resilient Network Protocols
  • Security Enhancements to Existing Networking Protocols
  • Deployment Study of Secure Protocols on the Internet
  • Security in Future Internet Architectures
  • Key Distribution/Management
  • Intrusion Detection and Response
  • Incentive Systems for P2P Systems and MANET Routing
  • Secure Protocol Configuration and Deployment
  • Challenges and Security Protocols for Social Networks
  • Secure Channel Establishment in Disadvantaged Networks
  • Network Forensics

Special Session 5: Blockchain Security and Privacy
  • Anonymity, Deanonymization and Privacy in Blockchain Systems
  • Compact Ring Signatures
  • Cyber-Infrastructures for Blockchain Systems
  • Defences and Countermeasures
  • Digital Preservation of Blockchain Records
  • Economic, Monetary, Legal, Ethical, and Societal Aspects
  • Formal Verification of Smart Contracts
  • Fraud Detection and Financial Crime Prevention
  • Compact Range Proofs
  • Blockchain Cryptographic Primitives
  • Incentive Mechanisms for Blockchains
  • New Threat Models and Attacks
  • Platforms for Decentralized Consensus
  • Privacy-Preserving Signature Aggregation
  • Provenance and Trust in Blockchain Systems
  • Regulation and Law Enforcement
  • Scalability Issues and Solutions
  • Trust Models and Trust Management in Blockchain Systems