The Call for Papers is now closed.

Important Dates

 Titles and abstracts of papers due:  Wednesday, 1 August 2012 (11:59 pm EDT)
 Full paper and panel submissions due: Monday, 6 August 2012 (11:59 pm EDT)
 Author notification: Monday, 22 October 2012
 Final version of papers and panels due: Monday, 3 December 2012

Symposium Goals

The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technologies. The proceedings are published by the Internet Society.
Special emphasis will be made to accept papers in the core theme of network and distributed systems security. Consequently, papers that cover networking protocols and distributed systems algorithms are especially invited to be submitted. Moreover, practical papers in these areas are also very welcome.

What to Submit

Technical papers and panel proposals are solicited. Technical papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. Double-submission will result in immediate rejection. The Program Committee reserves the right to share information with other conference chairs and journal editors so as to detect such cases.
Technical papers should be written in English. Papers must not exceed 15 pages total (including the references and appendices). Papers must be formatted for US letter (not A4) size paper with margins of at least 0.75 in. on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates found at:
Reviewing is double blind, and technical papers should thus be properly anonymized to conceal the authors’ identities. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Committee. Some papers that cannot be accepted as full technical papers may be invited by the Program Committee to be presented at the conference as short talks. Priority will be given to the papers that have fresh, unconventional ideas.
Panel proposals should be one page and must describe the topic, identify the panel chair, explain the panel format, and list three to four potential panelists. A description of each panel will appear in the proceedings, and may, at the discretion of the panel chair, include written position statements from the panelists.
Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.
Submissions are solicited in, but not limited to, the following areas:
 Anti-malware techniques: detection, analysis, and prevention
 Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
 Future Internet architecture and design
 High-availability wired and wireless networks
 Implementation, deployment and management of network security policies
 Integrating security in Internet protocols: routing, naming, network management
 Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
 Intrusion prevention, detection, and response
 Privacy and anonymity technologies
 Public key infrastructures, key management, certification, and revocation
 Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
 Security for collaborative applications: teleconferencing and video-conferencing
 Security for Cloud Computing
 Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, & licensing
 Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
 Security for future home networks, Internet of Things, body-area networks
 Security for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)
 Security for peer-to-peer and overlay network systems
 Security for Vehicular Ad-hoc Networks (VANETs)
 Security of Web-based applications and services
 Trustworthy Computing mechanisms to secure network protocols and distributed systems
The deadline for full submissions, made electronically in PDF format, is 11:59 pm EDT, 6 August 2012. However, titles and abstracts of papers must be received by 11:59 pm EDT, 1 August 2012. Each submission will be acknowledged by email; if acknowledgement is not received within seven days, contact the Program Chair. Authors and panelists will be notified of acceptance by 22 October 2012, and given instructions on how to prepare the camera-ready copy.

Submission Site