Topics
- Network protocol security: routing, naming, network management
- Network perimeter controls: firewalls, packet filters, application gateways
- Security issues in Future Internet architecture and design
- Cloud computing security
- Smart Grid Security
- Anti-malware techniques: detection, analysis, and prevention
- Security of web-based applications and services
- Intrusion prevention, detection, and response
- Secure future home networks, Internet of Things, body-area networks
- Privacy and anonymity technologies
- Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
- Security of personal communication systems
- Security for wireless, mobile networks
- Security of peer-to-peer and overlay network systems
- Vehicular Ad-hoc Network (VANETs) Security
- Network security policies: implementation deployment, management
- Electronic commerce security: e.g., payments, notarization, timestamping
- Public key infrastructures, key management, certification, and revocation
- Intellectual property protection: protocols, implementations, DRM
- Special problems and case studies: cost, usability, security vs. efficiency
- Security for Emerging Technologies
- Trustworthy Computing for network protocols and distributed systems
- Collaborative applications: teleconferencing and video-conferencing
- Security of large-scale critical infrastructures
- Secure Electronic Voting
- Network and distributed systems forensics
Who should Attend
Chief Technology and Privacy Officers, University Researchers and Educators, Operations and Security Managers, Security Analysts and System Administrators.