NDSS Symposium 2010
The Dana on Mission Bay
San Diego, California
February 28 - March 3, 2010

17th Annual Network & Distributed System Security Symposium
Call for Papers


Important Dates 
* Titles and abstracts of papers due: Friday, September 11, 2009
  (11:59 pm EDT)
* Full paper and panel submissions due: Friday, September 18, 2009
  (11:59 pm EDT)
* Author notification:  Friday, November 13, 2009
* Final version of papers and panels due:  Friday, December 18, 2009

Symposium Goals
The Network and Distributed System Security Symposium fosters
information exchange among research scientists and practitioners of
network and distributed system security services. The target audience
includes those interested in practical aspects of network and
distributed system security, with a focus on actual system design and
implementation (rather than theory). A major goal is to encourage and
enable the Internet community to apply, deploy, and advance the state
of available security technology.

The proceedings are published by the Internet Society (ISOC).

How to Submit
Submission instructions are available at: http://www.softconf.com/a/ndss2010

What to Submit
Both technical papers and panel proposals are solicited. Technical
papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All papers from authors perpetrating such
"double submissions" will be immediately rejected from the
symposium. The Program Committee reserves the right to share
information with other conference chairs and journal editors so as to
detect such cases.

Technical papers should not exceed 20 pages, total, including the bibliography and well-marked appendices (using 11-point font, single column format, and 1-inch margins on 8.5"x11" or A4 paper). Technical papers must include the authors' names and affiliations.

The Program Committee members are not required to read the appendices,
so the paper should be intelligible without them. Technical papers
will appear in the proceedings. Panel proposals should be one page and
must describe the topic, identify the panel chair, explain the panel
format, and list three to four potential panelists. A description of
each panel will appear in the proceedings, and may, at the discretion
of the panel chair, include written position statements from the

Submissions are solicited in, but not limited to, the following areas:
* Security of Web-based applications and services
* Anti-malware techniques: detection, analysis, and prevention
* Intrusion prevention, detection, and response
* Security for electronic voting
* Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
* Privacy and anonymity technologies
* Network perimeter controls: firewalls, packet filters, and
  application gateways
* Security for emerging technologies: sensor networks, wireless/mobile
  (and ad hoc) networks, and personal communication systems
* Security for Vehicular Ad-hoc Networks (VANETs)
* Security for peer-to-peer and overlay network systems
* Security for electronic commerce: e.g., payment, barter, EDI,
  notarization, timestamping, endorsement, and licensing
* Implementation, deployment and management of network security policies
* Intellectual property protection: protocols, implementations,
  metering, watermarking, digital rights management
* Integrating security services with system and application security
  facilities and protocols
* Public key infrastructures, key management, certification, and revocation
* Special problems and case studies: e.g., tradeoffs between security
  and efficiency, usability, reliability and cost
* Security for collaborative applications: teleconferencing and
* Software hardening: e.g., detecting and defending against software
  bugs (overflows, etc.)
* Security for large-scale systems and critical infrastructures
* Integrating security in Internet protocols: routing, naming, network


Trust and Identity Paper
To promote research in the area of Trust and Identity, the Internet
Society will present a USD 500.00 prize for a paper on a significant
development in addressing current problems in on-line identity
management. Examples of possible topics include:

* On-line reputation management
* Third party identity provision
* Privacy and anonymity technologies
* Pseudonimity and user managed identity

Submitting authors should follow the same submission guidelines
established for other NDSS 2010 topic areas. ISOC will cover travel,
registration fee, and hotel accommodation for the designated author to
attend NDSS 2010 and present the paper. The USD 500 cash award is the
total prize. In the event of co-authors, the cash award will be
divided evenly.


Each paper submission to NDSS 2010 must be accompanied by a separate,
electronically submitted Submission Overview specifying the submission
type (paper or panel), the title or topic, author names with
organizational affiliations, and must specify a contact author along
with corresponding phone number, FAX number, postal address and email

The deadline for full submissions, made electronically in PDF format,
is 11:59 pm EST, September 18, 2009. However, titles and abstracts of
papers must be received by 11:59 pm EST, September 11, 2009. Each
submission will be acknowledged by email; if acknowledgement is not
received within seven days, contact the Program Chair. Authors and
panelists will be notified of acceptance by November 16, 2009, and
given instructions for preparing the camera-ready copy.