Computer and Network Security
Call for Papers

Symposium Chair and Vice-Chairs
   • Mohsen Guizani, Western Michigan University, USA, mguizani@cs.wmich.edu
   • Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan, hshwchen@mail.nsysu.edu.tw

Scope
The IEEE GLOBECOM 2005 Computer and Network Security Symposium will be held in St. Louis, Missouri. Original papers are invited in the area of computer and network security. With the advent of pervasive computer applications and due to the proliferation of heterogeneous wired and wireless computer networks, computer and network security has become paramount. The Computer and Network Security Symposium will address all aspects of the modeling, design, implementation, deployment, and management of computer/network security algorithms, protocols, architectures, and systems. Furthermore, contributions devoted to the evaluation, optimization, or enhancement of security mechanisms for current technologies as well as devising efficient security and privacy solutions for emerging technologies are solicited. Papers must represent high-quality and previously unpublished work. Topics of interest include, but are not limited to, the following:

Topics of interest:

• 3G, 4G security
• 802.11 security, 802.11i
• Ad hoc network security
• Application/network penetration testing
• Authentication protocols
• Biometric security: technologies, risks and vulnerabilities
• Bluetooth security
• Computer and network forensics
• Critical infrastructure security
• Data and system integrity
• Deployment and management of computer/network security policies
• Distributed Denial-Of-Service (DDOS) attacks and countermeasures
• Distributed systems security
• DNS spoofing and security
• Encryption standards
• Financial cryptosystems
• Firewalls
• Formal trust models
• Information hiding and watermarking
• Intrusion avoidance
• IPv6 security, IPSec
• Key distribution and management
• Light-weight cryptography
• Message authentication
• Mobile code security
• Network security metrics and performance evaluation
• Network traffic analysis techniques
• Operating System(OS) security and log analysis tools
• Peer-to-peer systems
• Public-key cryptography
• Revocation of malicious parties
• Robust Security Network (RSN)
• Secure naming
• Secure Socket Layer (SSL)
• Security modeling and protocol design
• Security specification techniques
• Self-healing networks
• Sensor network security
• Single- and multi-source intrusion detection and response (automation)
• Smart cards and secure hardware
• Symmetric key cryptography
• Transport Layer Security (TLS)
• Trust establishment
• Upper-layer authentication
• Virtual Private Networks (VPNs)
• Vulnerability, exploitation tools, and virus/worm analysis
• Web, e-commerce, m-commerce, and e-mail security
• Wi-Fi Protected Access (WPA)
Technical Program Committee

TBD