Computer and Network Security
Call for Papers

Symposium Chair and Vice-Chairs
    Mohsen Guizani, Western Michigan University, USA,
    Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan,

The IEEE GLOBECOM 2005 Computer and Network Security Symposium will be held in St. Louis, Missouri. Original papers are invited in the area of computer and network security. With the advent of pervasive computer applications and due to the proliferation of heterogeneous wired and wireless computer networks, computer and network security has become paramount. The Computer and Network Security Symposium will address all aspects of the modeling, design, implementation, deployment, and management of computer/network security algorithms, protocols, architectures, and systems. Furthermore, contributions devoted to the evaluation, optimization, or enhancement of security mechanisms for current technologies as well as devising efficient security and privacy solutions for emerging technologies are solicited. Papers must represent high-quality and previously unpublished work. Topics of interest include, but are not limited to, the following:

Topics of interest:

3G, 4G security
802.11 security, 802.11i
Ad hoc network security
Application/network penetration testing
Authentication protocols
Biometric security: technologies, risks and vulnerabilities
Bluetooth security
Computer and network forensics
Critical infrastructure security
Data and system integrity
Deployment and management of computer/network security policies
Distributed Denial-Of-Service (DDOS) attacks and countermeasures
Distributed systems security
DNS spoofing and security
Encryption standards
Financial cryptosystems
Formal trust models
Information hiding and watermarking
Intrusion avoidance
IPv6 security, IPSec
Key distribution and management
Light-weight cryptography
Message authentication
Mobile code security
Network security metrics and performance evaluation
Network traffic analysis techniques
Operating System(OS) security and log analysis tools
Peer-to-peer systems
Public-key cryptography
Revocation of malicious parties
Robust Security Network (RSN)
Secure naming
Secure Socket Layer (SSL)
Security modeling and protocol design
Security specification techniques
Self-healing networks
Sensor network security
Single- and multi-source intrusion detection and response (automation)
Smart cards and secure hardware
Symmetric key cryptography
Transport Layer Security (TLS)
Trust establishment
Upper-layer authentication
Virtual Private Networks (VPNs)
Vulnerability, exploitation tools, and virus/worm analysis
Web, e-commerce, m-commerce, and e-mail security
Wi-Fi Protected Access (WPA)
Technical Program Committee