The document "SecureComm 2020" was published on "2023-08-05T08:57:53" on the website "ConfIDent" under the URL https://confident-conference.org/index.php/Event:SecureComm 2020.
The document "SecureComm 2020" describes an event in the sense of a conference.
The document "SecureComm 2020" contains information about the event "SecureComm 2020" with start date "2020/10/21" and end date "2020/10/23".
The event "SecureComm 2020" is part of the event series identified by [[Event Series:SecureComm]]
Deadlines
|
||
Workshop |
|
||
Submission |
|
||
Tutorial |
|
||
Notification |
|
||
Camera-Ready |
Metrics
Venue
Washington, DC, United States of America
Warning: Venue is missing. The map might not show the exact location.
Topics
Topics of interest include, but are not limited to the following:
- Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
- Security & Privacy in the Internet of Things (IoT)
- Security & Privacy in Cyber-Physical Systems (CPS)
- Security & Privacy in next-generation communication systems (e.g., VoIP, 5G)
- Secure applications of blockchain technology
- Network Intrusion Detection and Prevention, Firewalls, Packet Filters
- Malware Analysis and Detection including Botnets, Trojans and APTs
- Web and Systems Security
- Distributed Denial of Service Attacks and Defenses
- Communication Privacy and Anonymity
- Circumvention and Anti-Censorship Technologies
- Network and Internet Forensics Techniques
- Authentication Systems: Public Key
- Infrastructures, Key Management, Credential Management
- Secure Routing, Naming/Addressing, Network Management
- Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
- Security & Privacy in Peer-to-Peer and Overlay Networks
- Security & Isolation in Cloud, Data Center and Software-Defined Networks
About SecureComm 2020
SecureComm seeks high-quality research contributions, which have not been previously published or in parallel submission to another conference or journal. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.