NDSS security symposium issues Call for Papers

The Programme Committee for the 20th Annual Network and Distributed
System Security (NDSS) Symposium has issued the Call for
Papers. Submissions are solicited on a wide range of network and
distributed system security topics.
To be held 24-27 February 2013 in San Diego, California, NDSS will
present original research in such areas as distributed systems and
networks, web security and privacy, intrusion detection and attack
analysis, anonymity and cryptographic systems, security protocols and
policies, languages and systems security, malware and spam. The
deadline for full submissions, made electronically in PDF format, is 6
August 2012. However, titles and abstracts of papers must be received
by 1 August 2012. See the list of topics and submission requirements
The three-day event, which is attended annually by researchers and
practitioners from industry, academia, and government will be held at
the Catamaran Resort Hotel and Spa.


Call for Papers
The 20th Annual Network and Distributed System Security (NDSS) Symposium
The Catamaran Resort Hotel and Spa
San Diego, California
24-27 February 2013
Important Dates
Titles and abstracts of papers due: Wednesday, 1 August 2012 (11:59 pm EDT)
Full paper and panel submissions due: Monday, 6 August 2012 (11:59 pm EDT)
Author notification: Monday, 22 October 2012
Final version of papers and panels due: Monday, 3 December 2012
Symposium Goals
The Network and Distributed System Security Symposium fosters
information exchange among researchers and practitioners of network
and distributed system security. The target audience includes those
interested in practical aspects of network and distributed system
security, with a focus on actual system design and implementation. A
major goal is to encourage and enable the Internet community to apply,
deploy, and advance the state of available network and distributed
systems security technologies. The proceedings are published by the
Internet Society.
Special emphasis will be made to accept papers in the core theme of
network and distributed systems security. Consequently, papers that
cover networking protocols and distributed systems algorithms are
especially invited to be submitted. Moreover, practical papers in
these areas are also very welcome.
What to Submit
Technical papers and panel proposals are solicited. Technical papers
must not substantially overlap with papers that have been published or
that are simultaneously submitted to a journal or a
conference/workshop with proceedings. Double-submission will result in
immediate rejection. The Programme Committee reserves the right to
share information with other conference chairs and journal editors so
as to detect such cases.
Technical papers should be written in English. Papers must not exceed
15 pages total (including the references and appendices). Papers must
be formatted for US letter (not A4) size paper with margins of at
least 0.75 in. on all sides. The text must be formatted in a
two-column layout, with columns no more than 9 in. high and 3.375
in. wide. The text must be in Times font, 10-point or larger, with
12-point or larger line spacing. Authors are encouraged to use the
IEEE conference proceedings templates found at:

Reviewing is double blind, and technical papers should thus be
properly anonymized to conceal the authors' identities. Submissions
that violate these requirements will be rejected without review. The
list of authors cannot be changed after the acceptance decision is
made unless approved by the Programme Committee. Some papers that
cannot be accepted as full technical papers may be invited by the
Programme Committee to be presented at the conference as short
talks. Priority will be given to the papers that have fresh,
unconventional ideas.
Panel proposals should be one page and must describe the topic,
identify the panel chair, explain the panel format, and list three to
four potential panelists. A description of each panel will appear in
the proceedings, and may, at the discretion of the panel chair,
include written position statements from the panelists.
Submissions must be in Portable Document Format (.pdf). Authors should
pay special attention to unusual fonts, images, and figures that might
create problems for reviewers. Your document should render correctly
in Adobe Reader 9 and when printed in black and white.
Submissions are solicited in, but not limited to, the following areas:
* Anti-malware techniques: detection, analysis, and prevention
* Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
* Future Internet architecture and design
* High-availability wired and wireless networks
* Implementation, deployment and management of network security policies
* Integrating security in Internet protocols: routing, naming, network
* Intellectual property protection: protocols, implementations,
  metering, watermarking, digital rights management
* Intrusion prevention, detection, and response
* Privacy and anonymity technologies
* Public key infrastructures, key management, certification, and revocation
* Special problems and case studies: e.g., tradeoffs between security
  and efficiency, usability, reliability and cost
* Security for collaborative applications: teleconferencing and
* Security for Cloud Computing 
* Security for electronic commerce: e.g., payment, barter, EDI,
  notarization, timestamping, endorsement, & licensing
* Security for emerging technologies: sensor networks, wireless/mobile
  (and ad hoc) networks, and personal communication systems
* Security for future home networks, Internet of Things, body-area networks 
* Security for large-scale systems and critical infrastructures (e.g.,
  electronic voting, smart grid)
* Security for peer-to-peer and overlay network systems 
* Security for Vehicular Ad-hoc Networks (VANETs) 
* Security of Web-based applications and services 
* Trustworthy Computing mechanisms to secure network protocols and
  distributed systems
The deadline for full submissions, made electronically in PDF format,
is 11:59 pm EDT, 6 August 2012. However, titles and abstracts of
papers must be received by 11:59 pm EDT, 1 August 2012. Each
submission will be acknowledged by email; if acknowledgement is not
received within seven days, contact the Programme Chair. Authors and
panelists will be notified of acceptance by 22 October 2012, and given
instructions on how to prepare the camera-ready copy.
Submission Site: http://www.easychair.org/conferences/?conf=ndss2013

Programme Committee
Peng Ning (Chair), NC State University, USA
Ehab Al-Shaer, UNC Charlotte, USA 
Yair Amir, Johns Hopkins University, USA 
Michael Backes, Saarland University and MPI-SWS, Germany 
Dirk Balfanz, Google, USA 
Davide Balzarotti, EURECOM, France 
Lujo Bauer, Carnegie Mellon University, USA 
Steven Bellovin, Columbia University, USA 
Elie Bursztein, Google, USA 
Srdjan Capkun, ETH Zurich, Switzerland 
Marc Dacier, Symantec, France 
Wenliang Du, Syracuse University, USA 
William Enck, NC State University, USA 
Úlfar Erlingsson, Google, USA 
Nick Hopper, University of Minnesota, USA 
Xuxian Jiang, NC State University, USA 
Apu Kapadia, Indiana University, USA 
Stefan Katzenbeisser, TU Darmstadt, Germany 
Roger Khazan, MIT Lincoln Lab, USA 
Yongdae Kim, University of Minnesota, USA, and KAIST, South Korea 
Engin Kirda, Northeastern University, USA 
Wenke Lee, Georgia Institute of Technology, USA 
Jun Li, University of Oregon, USA 
Ninghui Li, Purdue University, USA 
Zhichun Li, NEC Laboratories America, USA 
Zhenkai Liang, National University of Singapore, Singapore 
Yao Liu, University of South Florida, USA 
Jonathan McCune, Carnegie Mellon University, USA 
Patrick McDaniel, Penn State University, USA 
John Mitchell, Stanford University, USA 
David Molnar, Microsoft Research, USA 
Cristina Nita-Rotaru, Purdue University, USA 
Alina Oprea, RSA Laboratories, USA 
Bryan Parno, Microsoft Research, USA 
Radha Poovendran, University of Washington, USA 
Phillip Porras, SRI International, USA 
Zhiyun Qian, NEC Laboratories America, USA 
Michael Reiter, UNC Chapel Hill, USA 
Kui Ren, Illinois Institute of Technology, USA 
Thomas Ristenpart, University of Wisconsin, USA 
Volker Roth, Freie Universität Berlin, Germany 
Ahmad-Reza Sadeghi, TU Darmstadt, Germany 
Pierangela Samarati, Università degli Studi di Milano, Italy 
Elaine Shi, University of Maryland, USA 
Radu Sion, Stony Brook University, USA 
Robin Sommer, ICSI/LBNL, USA 
Abhinav Srivastava, AT&T Labs, USA 
Wade Trappe, Rutgers University, USA 
Patrick Traynor, Georgia Institute of Technology, USA 
David Wagner, UC Berkeley, USA 
Cliff Wang, Army Research Office, USA 
XiaoFeng Wang, Indiana University, USA 
Venkat Venkatakrishnan, University of Illinois at Chicago, USA 
Tao Wei, UC Berkeley, USA, and Peking University, China 
Glenn Wurster, Research In Motion Limited, Canada 
Yinglian Xie, Microsoft Research, USA 
Dongyan Xu, Purdue University, USA 
Heng Yin, Syracuse University, USA 
Xiaolan Zhang, IBM Research, USA