Back to top


Call for Paper Security Workshop 2012
CSP Workshop: The first International Workshop on Cyber Security and Privacy (CSP)
Sanya, China, Oct 10 – 12, 2012

We are living in the ubiquitous cyber networking environments and communicate on the move (COM). The cyber communication intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, air satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Some wireless communications are even covert and prevent to be detected or intercepted by the regular energy detectors. Cyber attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious. Consequently, the detections and preventions of these cyber attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new vulnerabilities such as ClickBot.A are emerging every day and they are even more stealthy and intelligent. Moreover, new network protocols and applications open new channelsfor adversaries to take advantage. Clouds bring us new application along with new vulnerabilities that we have to investigate. CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.

Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:

• Cryptography and key algorithms
• Security modeling and vulnerability analysis
• Intrusion detection, traffic analysis and decision making of security
• Information integrity, assurance, trustworthy, authentication, and access control
• Distributed data storage and secure data management outsourcing (e.g., database as a service)
• Protocol security and privacy policies
• Distributed systems security
• Embedded systems security and forensics
• Network security and malware
• Networking protocols and security trace back
• Accountability and anonymity 
• Security architectures, policy, and regulatory 
• Hardware, application, andsystem security
• Censorship and censorship-resistance 
• Language-based security 
• Privacy-preserving systems 
• Usability/energy/cost/efficiency of security in the network
• Security protocols and strategies in clouds, sensor, cognitive, ad hoc, mesh, and satellite networks

Technical Program Committee
Shared with CyberC 2012

Important Days:
May 15, 2012 - Conference Paper Submission Deadline
July 10, 2012 - Notification of Acceptance/Rejection & Registration Starts
August 1, 2012 - Camera-Ready Paper Submission Due & Registration Due

Manuscript Guidelines
All submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see Outgoing/proceedings/. Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English.

Manuscript submission procedure is available over the Web at We encourage you to use edas online submission by selecting “CSP 2012”. If you have troubles in using the Web submission, you can also submit your paper to or contact us. Electronic submissions must be in the form of a readable PDF file.

Paper Acceptance
Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.     
All accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer Society's Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will further arranged for indexing through IEE INSPEC, EI (Compendex), and Thomson ISI. Authors of accepted papers, or at least one of them, should register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE Xplore and EI after the conference.

Other Information
For other issues, please follow the CyberC instructions (see or email to