Network Security and Information Assurance Symposium

 

Original research papers on all technical aspects of Network Security
and Information Assurance are solicited for submission to the IEEE ICC
2006 Network Security and Information Assurance Symposium. The aim is
to provide a forum for Network Research and Information Assurance
researchers and practitioners to share their research and experiences.

There are two tracks for the symposium: (1) a network security track,
and (2) an information assurance track. The submissions must specify
the track for the review process.

It is a 3-full day symposium with the following topics of interest:

  • Access Control and Audit

  • Anonymity and Pseudonymity

  • Authentication

  • Automated Security Analysis

  • Biometrics

  • Cryptographic tools

  • Data Integrity

  • Database Security

  • Denial of Service

  • DRM (Digital Rights Management)

  • Distributed Systems Security

  • Distributed Trust

  • Electronic Privacy

  • Forensics

  • Formal methods

  • Grid security

  • Identity Management

  • Information flow

  • Information Flow

  • Intrusion Detection and Defense

  • Insider Threats

  • Language-Based Security

  • Mobile Code and Agent Security

  • Network Security

  • Operating systems security

  • P2P security

  • Secure Hardware and Smartcards

  • Security Engineering

  • Security in Heterogeneous and Large-scale Environments

  • Security of Mobile Ad-Hoc Networks

  • Security Protocols

  • Security of Sensor Networks

  • Security Verification

  • Viruses, Worms, and Other Malicious Code

 

Technical Program Members

Aggelos Kiayias, Unversity of Conneticut, USA
Albert Levi, Sabanci University, Turkey
Avishai Wool, Tel Aviv University, Israel
Ayse Bener, Bogazici University, Turkey

Bart De Decker, K.U.Leuven, Belgium
Behcet Sarikaya, University of Northern British Columbia, Canada
Boleslaw Szymanski, Renselear Polytechnic Inst, USA

Bruno Crispo, Vrije Universiteit Amsterdam
Christian Tschudin, Basel University, Switzerland
Craig Partridge, BBN, USA
Edgar Jamhour, Pontifical Catholic University of Parana, Brazil

Ehab Al-Shaer, DePaul University, USA
Felix Wu, University of California Davis, USA

Frank Piessens, K. U. Leuven, Belgium
Gerald Brose, Projektron GmbH, Germany
Guevara Noubir, Northeastern Univ., USA
Harmut Pohl, Institute for Information Security, Germany
Helen Wang, Microsoft, USA
Hervé Debar, France Télécom R&D, France
John Ioannidis, Columbia University, USA
Joni da Silva Fraga, Federal University of Santa Catarina, Brazil
Jose' Carlos Brustoloni, University of Pittsburgh, USA
Juan Garay, Bell Labs., USA
Levente Buttyan, Budapest University of Technology, Hungary
Luciano Paschoal Gaspary, Universidade do Vale do Rio dos Sinos, Brazil
Ludovic Mé, Supélec, France
Manu Malek, Stevens Institute of Technology, USA
Markus Jakobsson, Indiana University, USA
Michael StJohns, Nominum, USA
Moti Yung, Columbia University, USA
Nasir Memon, Polytechnic University, USA

Periklis Chatzimisios,TEI of Thessaloniki, Greece
Pierangela Samarati, University of Milan, Italy
Radha Provendran, Univ. of Washington, USA
Raheem A. Beyah, Georgia Tech, USA
Raquel Hill, University of Illinois, USA
Srdjan Capkun, UCLA, USA
Susanne Wetzel, Stevens Institute of Technology, USA
Vijay Varadharajan, Macquarie University, Australia
Virgil Gligor, University of Maryland, USA

Yang Xiao, The University of Memphis, USA
Yves Roudier, Institut EURECOM, France