NDSS security symposium issues Call for Papers The Programme Committee for the 20th Annual Network and Distributed System Security (NDSS) Symposium has issued the Call for Papers. Submissions are solicited on a wide range of network and distributed system security topics. To be held 24-27 February 2013 in San Diego, California, NDSS will present original research in such areas as distributed systems and networks, web security and privacy, intrusion detection and attack analysis, anonymity and cryptographic systems, security protocols and policies, languages and systems security, malware and spam. The deadline for full submissions, made electronically in PDF format, is 6 August 2012. However, titles and abstracts of papers must be received by 1 August 2012. See the list of topics and submission requirements below. The three-day event, which is attended annually by researchers and practitioners from industry, academia, and government will be held at the Catamaran Resort Hotel and Spa. ------------ Call for Papers The 20th Annual Network and Distributed System Security (NDSS) Symposium The Catamaran Resort Hotel and Spa San Diego, California 24-27 February 2013 http://www.internetsociety.org/events/ndss-symposium-2013 Important Dates Titles and abstracts of papers due: Wednesday, 1 August 2012 (11:59 pm EDT) Full paper and panel submissions due: Monday, 6 August 2012 (11:59 pm EDT) Author notification: Monday, 22 October 2012 Final version of papers and panels due: Monday, 3 December 2012 Symposium Goals The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technologies. The proceedings are published by the Internet Society. Special emphasis will be made to accept papers in the core theme of network and distributed systems security. Consequently, papers that cover networking protocols and distributed systems algorithms are especially invited to be submitted. Moreover, practical papers in these areas are also very welcome. What to Submit Technical papers and panel proposals are solicited. Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. Double-submission will result in immediate rejection. The Programme Committee reserves the right to share information with other conference chairs and journal editors so as to detect such cases. Technical papers should be written in English. Papers must not exceed 15 pages total (including the references and appendices). Papers must be formatted for US letter (not A4) size paper with margins of at least 0.75 in. on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates found at: http://www.computer.org/portal/web/cscps/formatting. Reviewing is double blind, and technical papers should thus be properly anonymized to conceal the authors' identities. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed after the acceptance decision is made unless approved by the Programme Committee. Some papers that cannot be accepted as full technical papers may be invited by the Programme Committee to be presented at the conference as short talks. Priority will be given to the papers that have fresh, unconventional ideas. Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists. Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white. Submissions are solicited in, but not limited to, the following areas: * Anti-malware techniques: detection, analysis, and prevention * Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques * Future Internet architecture and design * High-availability wired and wireless networks * Implementation, deployment and management of network security policies * Integrating security in Internet protocols: routing, naming, network management * Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management * Intrusion prevention, detection, and response * Privacy and anonymity technologies * Public key infrastructures, key management, certification, and revocation * Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost * Security for collaborative applications: teleconferencing and video-conferencing * Security for Cloud Computing * Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, & licensing * Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems * Security for future home networks, Internet of Things, body-area networks * Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid) * Security for peer-to-peer and overlay network systems * Security for Vehicular Ad-hoc Networks (VANETs) * Security of Web-based applications and services * Trustworthy Computing mechanisms to secure network protocols and distributed systems The deadline for full submissions, made electronically in PDF format, is 11:59 pm EDT, 6 August 2012. However, titles and abstracts of papers must be received by 11:59 pm EDT, 1 August 2012. Each submission will be acknowledged by email; if acknowledgement is not received within seven days, contact the Programme Chair. Authors and panelists will be notified of acceptance by 22 October 2012, and given instructions on how to prepare the camera-ready copy. Submission Site: http://www.easychair.org/conferences/?conf=ndss2013 Programme Committee Peng Ning (Chair), NC State University, USA Ehab Al-Shaer, UNC Charlotte, USA Yair Amir, Johns Hopkins University, USA Michael Backes, Saarland University and MPI-SWS, Germany Dirk Balfanz, Google, USA Davide Balzarotti, EURECOM, France Lujo Bauer, Carnegie Mellon University, USA Steven Bellovin, Columbia University, USA Elie Bursztein, Google, USA Srdjan Capkun, ETH Zurich, Switzerland Marc Dacier, Symantec, France Wenliang Du, Syracuse University, USA William Enck, NC State University, USA Úlfar Erlingsson, Google, USA Nick Hopper, University of Minnesota, USA Xuxian Jiang, NC State University, USA Apu Kapadia, Indiana University, USA Stefan Katzenbeisser, TU Darmstadt, Germany Roger Khazan, MIT Lincoln Lab, USA Yongdae Kim, University of Minnesota, USA, and KAIST, South Korea Engin Kirda, Northeastern University, USA Wenke Lee, Georgia Institute of Technology, USA Jun Li, University of Oregon, USA Ninghui Li, Purdue University, USA Zhichun Li, NEC Laboratories America, USA Zhenkai Liang, National University of Singapore, Singapore Yao Liu, University of South Florida, USA Jonathan McCune, Carnegie Mellon University, USA Patrick McDaniel, Penn State University, USA John Mitchell, Stanford University, USA David Molnar, Microsoft Research, USA Cristina Nita-Rotaru, Purdue University, USA Alina Oprea, RSA Laboratories, USA Bryan Parno, Microsoft Research, USA Radha Poovendran, University of Washington, USA Phillip Porras, SRI International, USA Zhiyun Qian, NEC Laboratories America, USA Michael Reiter, UNC Chapel Hill, USA Kui Ren, Illinois Institute of Technology, USA Thomas Ristenpart, University of Wisconsin, USA Volker Roth, Freie Universität Berlin, Germany Ahmad-Reza Sadeghi, TU Darmstadt, Germany Pierangela Samarati, Università degli Studi di Milano, Italy Elaine Shi, University of Maryland, USA Radu Sion, Stony Brook University, USA Robin Sommer, ICSI/LBNL, USA Abhinav Srivastava, AT&T Labs, USA Wade Trappe, Rutgers University, USA Patrick Traynor, Georgia Institute of Technology, USA David Wagner, UC Berkeley, USA Cliff Wang, Army Research Office, USA XiaoFeng Wang, Indiana University, USA Venkat Venkatakrishnan, University of Illinois at Chicago, USA Tao Wei, UC Berkeley, USA, and Peking University, China Glenn Wurster, Research In Motion Limited, Canada Yinglian Xie, Microsoft Research, USA Dongyan Xu, Purdue University, USA Heng Yin, Syracuse University, USA Xiaolan Zhang, IBM Research, USA