Abbrevation
NDSS
City
San Diego
Country
United States
Deadline Paper
Start Date
End Date
Abstract

The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security&#046; The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation&#046; A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies&#046;<br>Technical papers and panel proposals are solicited&#046; All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2018&#046; The Proceedings will be made freely accessible from the Internet Society webpages&#046; Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper&#046; The authors are therefore free to post the camera&#8211;ready versions of their papers on their personal pages and within their institutional repositories&#046; Reproduction for commercial purposes is strictly prohibited and requires prior consent&#046;<br>Submissions are solicited in, but not limited to, the following areas:<br>Anti&#8211;malware techniques: detection, analysis, and prevention<br>Combating cyber&#8211;crime: anti&#8211;phishing, anti&#8211;spam, anti&#8211;fraud techniques<br>Security for future Internet architectures and designs (e&#046;g&#046;, Software&#8211;Defined Networking)<br>High&#8211;availability wired and wireless networks<br>Implementation, deployment and management of network security policies<br>Integrating security in Internet protocols: routing, naming, network management<br>Intrusion prevention, detection, and response<br>Network security<br>Privacy and anonymity technologies<br>Security and privacy for distributed systems, e&#046;g&#046;, cryptocurrencies<br>Security and privacy in social networks<br>Public key infrastructures, key management, certification, and revocation<br>Special problems and case studies: e&#046;g&#046;, tradeoffs between security and efficiency, usability, reliability and cost<br>Security for collaborative applications: teleconferencing and video&#8211;conferencing<br>Security for cloud computing<br>Security for emerging technologies: sensor/wireless/mobile/personal networks and systems<br>Security for future home networks, Internet of Things, body&#8211;area networks<br>Security for large&#8211;scale systems and critical infrastructures (e&#046;g&#046;, electronic voting, smart grid)<br>Security and privacy of systems based on machine learning<br>Security for peer&#8211;to&#8211;peer and overlay network systems<br>Security for Vehicular Ad&#8211;hoc Networks (VANETs)<br>Security of Web&#8211;based applications and services<br>Trustworthy Computing mechanisms to secure network protocols and distributed systems<br>Usable security and privacy<br>