CONFERENCE PROGRAM REGISTRATION VENUE VISA

COMMUNICATION AND INFORMATION SYSTEM SECURITY SYMPOSIUM

Symposium Co-Chairs
Abderrahim Benslimane, LIA/CERI, France
(abderrahim.benslimane@univ-avignon.fr)
Stamatios V. Kartalopoulos, University of Oklahoma, USA (kartalopoulos@ou.edu)
Qingming Ma, Juniper Networks, USA (qma@juniper.net)
Guenter Schaefer, Technical University of Ilmenau, Germany (g.schaefer@ieee.org)

Sponsoring
Technical Committee
Communications and Information Security

Scope
With the advent of pervasive computer applications and due to the proliferation of heterogeneous wired/wireless networks and ubiquitous computing, computer and network security has become a primary concern for individuals, industry and governments. For example, sensitive information can potentially be copied, altered or injected for malicious purposes, e.g. taking advantage of sensitive information or stealing/abusing digital identities. There is also a growing risk that computer and network attacks will be deployed to disturb or even severely impact important infrastructure components like communication systems, power grids, or traffic control systems in order to cause significant economic damages. In addition to this, there is a growing awareness of privacy concerns, regarding individual users as well as corporate and/or governmental organizations. Therefore, new approaches to information security, availability protection and privacy management are required to be tightly integrated into IT- and communication systems.
The Computer and Communications Network Security Symposium (CCNS) will address all aspects of modeling, design, implementation, deployment, and management of computer/network security algorithms, protocols, architectures, and systems. Envisaged contributions to CCNS symposium target all security aspects of wired networks (electrical/optical) as well as wireless networks: 3G/ 4G, Satellite, WLAN, WiMAX, Bluetooth, Ad hoc, Vehicular, Sensor and RFID networks, considering all layers from the physical to the application layer (including middleware and peer-to-peer systems). Furthermore, contributions devoted to the evaluation, optimization, or enhancement of security mechanisms for current technologies as well as novel security and data privacy solutions for emerging technologies are solicited.

Papers should represent high-quality and previously unpublished work, and may not be submitted in parallel to other conferences or publications.

Topics of Interest

  • Confidentiality  and Integrity Protection
  • Authentication Protocols and Services
  • Key Distribution and management
  • PKI and security management
  • Trust models and Trust establishment
  • Certificate Revocation & Exclusion of Compromised Entities
  • Identity Management
  • Social Network Security Issues
  • Authorization and Access Control
  • Availability of Secure Services
  • Distributed Denial-Of-Service (DDOS) Attacks and Countermeasures
  • Critical Infrastructure Security
  • Network Resilience & Self-Healing Networks
  • Light-Weight Cryptography
  • Quantum Cryptography and QKD
  • Chaos & Chaotic Cryptographic Systems
  • Information Hiding and Watermarking
  • Applications of Cryptography and Cryptanalysis in Communications Security
  • Secure Physical, MAC, Routing and Upper Layer Protocols
  • IPSec and Virtual Private Networks (VPNs)
  • Secure Socket Layer VPN
  • Integrated Security Gateway Systems
  • Secure Cross Layer Design
  • Mobile Communications Security
  • Security in Ad-hoc & Sensor Networks
  • Deployment and Management of Computer/Network Security Policies
  • Firewall Technologies and Configuration
  • Network Security Metrics and Performance Evaluation
  • Network Traffic Analysis Techniques 
  • Anonymous Communication
  • Secure Naming and Addressing
  • Prevention, Detection and Reaction Design
  • Monitoring Design for Security
  • Distributed Intrusion Detection Systems & Countermeasures
  • Single- and Multi-Source Intrusion Detection and Response (Automation)
  • Deep Packet Inspection Techniques
  • Detection of  Unknown Attacks
  • Active Defence Mechanisms
  • Secure System Implementation Techniques
  • Security Modelling and Protocol design
  • Security Specification Techniques
  • Application/Network Penetration Testing
  • Vulnerability, Exploitation Tools, and Virus/Worm Analysis
  • Operating System (OS) Security and Log Analysis Tools
  • Mobile Code Security
  • Web, Email, E-Commerce, and M-Commerce Security
  • Smart Cards and Secure Hardware
  • Security Protocols for Auto-ID Systems
  • Biometric Security: Technologies, Risks and Vulnerabilities
  • Security issues in optical networks


Technical Program Committee

Mithun Acharya, North Carolina State University, USA
Sasan Adibi, University of Waterloo, Canada
Hossam Afifi, Institut Telecom, France
Akshai Aggarwal, University of Windsor, Canada
Sheikh Ahamed, Marquette University, USA
Waseem Ahmad, University of Illinois at Chicago, USA
Mohammed Zaki Ahmed, University of Plymouth, United Kingdom
Toufik Ahmed, University of Bordeaux-1 / CNRS-LaBRI, France
Efthimia Aivaloglou, University of the Aegean, Greece
Ala Al-Fuqaha, Western Michigan University, USA
Dmitri Alperovitch, Secure Computing, USA
Alessandro Anzaloni, Instituto Tecnologico de Aeronautica, Brazil
Knarig Arabshian, Columbia University, USA
Chadi Assi, Concordia University, Canada
Paulo Ayres, Polytechnic University, USA
Mohamad Badra, "LIMOS Laboratory,  CNRS France", France
Marcelo Bagnulo, University Carlos III of Madrid, Spain
Saewoong Bahk, Seoul National University, Korea
Xiaofeng Bai, The University of Western Ontario, Canada
Andrea Baiocchi, "University of Roma ""La Sapienza""", Italy
Yannis Bakopoulos, NetNediaLab, USA
Lichun Bao, "University of California,  Irvine", USA
Ezedin Barka, UAE University, UAE
Dhiman Barman, "UC,  Riverside", USA
Ilija Basicevic, Faculty of Technical Sciences, Serbia and Montenegro
Carole Bassil, ENST - Telecom Paris, Lebanon
Lynn Batten, Deakin University, Australia
Kpatcha Bayarou, Fraunhofer Institute for Secure Information Technology, Germany
Tarek Bejaoui, "Mediatron Lab.,  Carthage University", Tunisia
Kadri Benamar, University of Tlemcen, Algeria
Abderrahim Benslimane, University of Avignon, France
Peter Bertok, RMIT University, Australia
Raheem Beyah, Georgia State University, USA
Chen Bo, Beijing University of Posts and Telecommunications, P.R. China
Giovanni Bodini, "University of Rome ""Tor Vergata""", Italy
Rajendra Boppana, Univ. of Texas at San Antonio, USA
Noureddine Boudriga, University of Carthage, Tunisia
Azzedine Boukerche, Univ. of Ottawa, Canada
Selma Boumerdassi, Conservatoire National des Arts et Métiers, France
Latifa Boursas, Technical University of Munich, Germany
Michael Brinkmeier, Technical University of Ilmenau, Germany
Ioannis Broustis, "University of California,  Riverside", USA
Rainer Bye, Technical University Berlin, Germany
Christian Callegari, University of Pisa, Italy
Hasan Cam, Arizona State University, USA
Joao Cangussu, University of Texas at Dallas, USA
Jiannong Cao, Hong Kong Polytechnic Univ, Hong Kong
Zhenfu Cao, "SJTU,  China", P.R. China
Davide Cerri, CEFRIEL - Politecnico di Milano, Italy
Herve Chabanne, Sagem Sécurité, France
Mohuya Chakrabarty, Institute of Engineering & Management, India
Alex Chang, UCLA, USA
H. Jonathan Chao, Polytechnic University Brooklyn, USA
Hakima Chaouchi, INT, France
Ali Chehab, American University of Beirut, Lebanon
Bo Chen, Harbin Institute of Technology, P.R. China
Chih-Hao Chen, National Tsing Hua University, Taiwan
Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan
Jyh-Cheng Chen, National Tsing Hua University, Taiwan
Thomas Chen, Southern Methodist University, USA
Weifeng Chen, California University of Pennsylvania, USA
Yingying Chen, Stevens Institute of Technology, USA
Yu Chen, State University of New York - Binghamton, USA
Yuhua Chen, University of Houston, USA
Shin-Ming Cheng, Taiwan University, Taiwan
Winnie Cheng, MIT, USA
Yu Cheng, Illinois Institute of Technology, USA
Francisco Chiclana, De Montfort University, United Kingdom
Piotr Cholda, AGH University of Science and Technology, Poland
Henry Chu, University of Louisiana, USA
Xiaowen Chu, Hong Kong Baptist University, Hong Kong
Yen-Ming Chu, National Tsing Hua University, Taiwan
Yung-Cheng Chu, National Tsing Hua University, Taiwan
Ma Chunbo, Shanghai Jiao Tong University, P.R. China
Jong-Moon Chung, Yonsei University, Korea
Song Ci, University of Nebraska-Lincoln, USA
Bruno Crispo, Universita di Trento, Italy
Walid Dabbous, INRIA, France
Marc Dacier, Institut Eurecom, France
Ricardo Dahab, UNICAMP, Brazil
Floriano De Rango, University of Calabria, Italy
Mourad Debbabi, "Concordia University,  Montreal", Canada
Lingli Deng, IOS, P.R. China
Yingfei Dong, Univ. of Hawaii, USA
Arjan Durresi, Indiana University Purdue University Indianapolis, USA
Bassam El Saghir, GET-INT, France
El-Sayed El-Alfy, KFUPM, Saudi Arabia
Khalil El-Khatib, UOIT, Canada
Hatem Elhannachi, Ecole Nationale des Sciences de lInformatique, Tunisia
Mohamed Eltoweissy, Virginia Tech, USA
Benjamin Fabian, Humboldt University Berlin, Germany
Afshin Fallahi, University of Toronto, Canada
Hanane Fathi, "Research Center for Information Security,  AIST", Japan
Yi-Hsuan Feng, National Tsing Hua University, Taiwan
Alberto Ferrante, University of Lugano, Switzerland
Simone Ferraresi, "University of Rome ""La Sapienza"" - ELSAG S.p.A.", Italy
Mauro Fonseca, PUC-PR, Brazil
Dan Forsberg, Nokia Research Center, Finland
Mario Freire, University of Beira Interior, Portugal
Antonio Augusto Fröhlich, Federal University of Santa Catarina, Brazil
Xiaoming Fu, University of Goettingen, Germany
Xiaoying Gan, Shanghai Jiao Tong University, P.R. China
Alberto Garcia-Martinez, University Carlos III of Madrid, Spain
Camille Gaspard, Purdue University, USA
Dimitris Geneiatakis, "University of the Aegean, ", Greece
Patrick George, Gemalto, France
Paolo Giacomazzi, Politecnico di Milano, Italy
Bok-Min Goi, Multimedia University, Malaysia
Chao Gong, University of Mary Hardin-Baylor, USA
Hongmei Gou, University of Maryland, USA
Manimaran Govindarasu, Iowa State University, USA
Stefanos Gritzalis, University of the Aegean, Greece
Qijun Gu, Texas State University at San Marcos, USA
Xiaozhuo Gu, National Digital Switching System Engineering & Technological R&D Center, P.R. China
Lei Guang, Concordia University, Canada
Abdelhak Gueroui, University of Versailles, France
Sghaier Guizani, Qatar University, Qatar
Mohamed Hamdi, Carthage University, Tunisia
Zhu Han, "University of Maryland,  College Park", USA
Liwen He, "Security Research Center,  BT Group CTO Office", United Kingdom
Pin-Han Ho, University of Waterloo, Canada
Wolfgang Hommel, "Leibniz Supercomputing Center,  Munich", Germany
Honglin Hu, Shanghai Research Center for Wireless Communications, P.R. China
Jiankun Hu, RMIT University, Australia
Rose Qingyang Hu, Mississippi State University, USA
Shiyan Hu, Michigan Technological University, USA
Chung-Ming Huang, National Cheng Kung University, Taiwan
Nen-Fu Huang, National Tsing Hua University, Taiwan
Nasir Jamil, Southern Methodist University, USA
Xiaoqi Jia, Graduate School of Chinese Academy of Sciences, P.R. China
Di Jin, University of Oklahoma, USA
Xing Jin, HKUST, Hong Kong
Yoshito Kanamori, "Univ of Alaska,  Anchorage", USA
Anestis Karasaridis, AT&T Labs, USA
Vasileios Karyotis, National Technical University of Athens, Greece
Moinul Khan, Intel Corporation, USA
Mounis Khatib, Institut National de Télécommunication, France
Kazukuni Kobara, AIST, Japan
Turgay Korkmaz, University of Texas at San Antonio, USA
Dilip Krishnaswamy, Qualcomm, USA
Vladimir Kropotov, Bauman University, Russia
Sanjeev Kumar, University of Texas--Pan American, USA
Julien Laganier, NTT DoCoMo Euro-Labs, Germany
Yuan-Cheng Lai, IM  NTUST, Taiwan
Constantinos Lambrinoudakis, University of the Aegean, Greece
Christopher Leckie, University of Melbourne, Australia
Tsern-Huei Lee, National Chiao Tung University, Taiwan
Youngseok Lee, Chungnam National University, Korea
Jie Li, University of Tsukuba, Japan
Jun Li, University of Oregon, USA
Na Li, The Ohio State University, USA
Xiangfang Li, WINLAB Rutgers Univ., USA
Yang Li, Chinese Academy of Sciences, P.R. China
Frank Yeong-Sung Lin, National Taiwan University, Taiwan
Xiaodong Lin, University of Waterloo, Canada
Bin Liu, Tsinghua University, P.R. China
Danielle Liu, AT&T, USA
Yali Liu, University of California Davis, USA
Zhijun Liu, The Ohio State University, USA
Kejie Lu, University of Puerto Rico at Mayaguez, Puerto Rico
Miao Ma, The Hong Kong University of Science & Technology, Hong Kong
Leonardo Maccari, Univerity of Florence, Italy
Robert Malaney, University of New South Wales, Australia
Gregorio Martinez Perez, University of Murcia (UMU), Spain
Lykomidis Mastroleon, Stanford Universiry, USA
Chetan Mathur, Stevens Institute of Technology, USA
Carlos Maziero, "Pontifical Catholic University of Paraná,  PUCPR", Brazil
Mohammed Misbahuddin, Centre for Development of Advanced Computing, India
Piyush Mishra, Michigan Technological University, USA
Yutaka Miyake, KDDI R&D Laboratories Inc., Japan
Refik Molva, Insitut Eurecom, France
Mohammad Moulavi, Ferdowsi University of mashhad, Iran
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Suku Nair, Southern Methodist University, USA
Nidal Nasser, University of Guelph, Canada
Lay Ong, Advanced Digital Institute, United Kingdom
Hadi Otrok, "CIISE,  Concordia University", Canada
Suat Ozdemir, Arizona State University, USA
Ai-Chun Pang, National Taiwan University, Taiwan
Symeon Papavassiliou, National Technical University of Athens, Greece
Stefano Paraboschi, University of Bergamo, Italy
Jung-Min Park, Virginia Polytechnic Institute and State University, USA
Antonio Pescape', University of Naples, Italy
Stefano Pesic, Cisco Systems, The Netherlands
Raphael Phan, Loughborough University, United Kingdom
Yi Ping, Shanghai Jiao Tong University, P.R. China
Vincenzo Piuri, University of Milan, Italy
Anand Prasad, NEC, Japan
Neeli Prasad, Center for TeleInFrastructure (CTIF), Denmark
Lijun Qian, Prairie View A&M University, USA
Yi Qian, National Institute of Standards and Technology, USA
Abderrezak Rachedi, University of Avignon, France
Erwin Rathgeb, Universität Duisburg-Essen, Germany
Peter Reiher, University of California at Los Angeles, USA
Slim Rekhis, University of Carthage, Tunisia
Jian Ren, Michigan State University, USA
Eric Renault, Institut National des Télécommunications, France
Simon Pietro Romano, University of Napoli Federico II, Italy
Bo Rong, International Institute of Telecommunications, Canada
Rei Safavi-Naini, University of Calgary, Canada
Peter Schoo, DoCoMo Euro-Labs, Germany
Nabil Seddigh, Solana Networks, Canada
Khushboo Shah, Nevis Networks, USA
Abdallah Shami, The University of Western Ontario, Canada
Hamid Sharif, University of Nebraska-Lincoln, USA
Tzu-Fang Sheu, National Tsing Hua University, Taiwan
Lian Shiguo, France Telecom R&D Beijing, P.R. China
SeongHan Shin, "Research Center for Information Security,  AIST", Japan
Guoqiang Shu, The Ohio State University, USA
Khaled Shuaib, UAEU, UAE
Paulo Silva, UFSC, Brazil
Krishna Sivalingam, "University of Maryland,  Baltimore County (UMBC)", USA
Harry Skianis, University of the Aegean, Greece
Theodore Stergiou, KMPG Greece, Greece
Thorsten Strufe, Eurecom, France
Chuan-Ching Sue, National Cheng Kung University, Taiwan
Bo Sun, Lamar University, USA
Zhili Sun, University of Surrey, United Kingdom
Keisuke Takemori, KDDI R&D Laboratories Inc., Japan
Caimu Tang, University of Southern California, USA
Seok Tang, NEC Technology (UK), United Kingdom
Bhavani Thuraisingham, University of Texas at Dallas, USA
Zouheir Trabelsi, UAE University, UAE
Po-Hao Tsang, National Taiwan University, Taiwan
Guillaume Urvoy-Keller, Institut Eurecom, France
Pramode Verma, The University of Oklahoma, USA
Giacomo Verticale, Politecnico di Milano, Italy
David Waiting, University of Cape Town, South Africa
Cheng-Xiang Wang, Heriot-Watt University, United Kingdom
Yong Wang, University of Nebraska-Lincoln, USA
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Bryan Wilkins, Nova Southeastern University, USA
Yang Xiang, Central Queensland University, Australia
Gaoxi Xiao, Nanyang Technological University, Singapore
Shi Xiao, Nanyang Technological University, Singapore
Yang Xiao, The University of Alabama, USA
Kaiqi Xiong, North Carolina State University, USA
Hao Yang, IBM T.J. Watson Research Center, USA
Kun Yang, University of Essex, United Kingdom
Jae-seung Yeom, Virginia Tech, USA
Sungwon Yi, ETRI, Korea
Seong-Moo Yoo, U of Alabama-Huntsville, USA
Wei Yu, Texas A&M University, USA
Hongwei Zhang, Wayne State University, USA
Weiyi Zhang, North Dakota State University, USA
Haojin Zhu, University of Waterloo, Canada
Ye Zhu, Cleveland State University, USA
Alf Zugenmaier, DoCoMo Euro-Labs, Germany

Presentation Style
The Globecom 2009 Technical Program Committee will go through a rigorous process to review all the papers submitted and select the best ones among them. The accepted papers will be presented in the conference either in a lecture style or in a poster style format. This distinction has no relationship with the quality of the accepted papers whatsoever. It is purely due to the limitations of the conference rooms available for lecture style presentations. Papers will be selected for lecture-style or poster-style presentation, solely based on the need to ensure topic homogeneity in lecture-style sessions.   All accepted papers will be published in the conference proceedings and IEEExplore without any indication of the presentation mode.