NordSec 2011, 16th Nordic Workshop on Secure IT-Systems, Tallinn, Estonia, 
October 26-28, 2011. (Abstracts due 31 July 2011, papers due 6 August 2011, short papers due 1 September 2011)
The conference welcomes contributions in the form of papers, short papers, 
and posters. Since 1996, the NordSec conferences have brought together 
computer security researchers and practitioners from around the world, and 
particularly from the Nordic countries and Northern Europe. The conference 
focuses on applied IT security and is intended to encourage interaction 
between academic and industrial research. Student papers and posters are 
particularly encouraged. Submissions reporting industrial or governmental 
experiences are also encouraged and will be given special consideration. 
The post-proceedings of the conference will appear in the Springer Lecture 
Notes in Computer Science (LNCS) series.

Contributions should reflect original research, developments, studies and 
practical experience within all areas of IT security. With the theme "IT 
Security in Governance", this year's conference will emphasize policies, 
strategies and technologies related to the security and sustainability of 
processes executed by heterogeneous organizations, departments or 
organizational clusters of all sizes. NordSec 2011 also welcomes 
contributions over a broad range of topics in IT security, including, but 
not limited to, the following areas:
       Applied cryptography
       Commercial security policies and their enforcement
       Communication and network security
       Computer crime and information warfare
       Hardware and smart card applications
       Internet and web security
       Intrusion detection
       Language-based techniques for security
       New ideas and paradigms in security
       Operating system security
       Privacy and anonymity
       Security education and training
       Security evaluation and measurement
       Security management and audit
       Security modeling and metrics
       Access control and security models
       Security protocols
       Social engineering and phishing
       Security usability
       Economics, law and social aspects of security
       Software security and malware
       Trust and identity management

For more information, please see