Check out the new USENIX Web site.


Contents

 USENIX Security '11 Home
 Overview
 Important Dates
 Symposium Organizers
 Symposium Topics
 Refereed Papers
 Invited Talks, Panels, Poster Session, Rump Session, and BoFs
 How and Where to Submit Refereed Papers
 
 Web Submission Form
 Sponsorship Opportunities
 Program and Registration Information

Call for Papers
in PDF

Interested in sponsorship opportunities for USENIX Security '11? Contact sponsorship@usenix.org.

USENIX Security '11 Call for Papers

Symposium Topics

Refereed paper submissions are solicited in all areas relating to systems and network security, including:

  • Adaptive security and system management
  • Analysis of network and security protocols
  • Applications of cryptographic techniques
  • Attacks against networks and machines
  • Authentication and authorization of users, systems, and applications
  • Automated tools for source code analysis
  • Botnets
  • Cryptographic implementation analysis and construction
  • Denial-of-service attacks and countermeasures
  • File and filesystem security
  • Firewall technologies
  • Forensics and diagnostics for security
  • Hardware security
  • Intrusion and anomaly detection and prevention
  • Malicious code analysis, anti-virus, anti-spyware
  • Network infrastructure security
  • Operating system security
  • Privacy-preserving (and compromising) systems
  • Public key infrastructure
  • Rights management and copyright protection
  • Security architectures
  • Security in heterogeneous and large-scale environments
  • Security policy
  • Self-protecting and -healing systems
  • Techniques for developing secure systems
  • Technologies for trustworthy computing
  • Usability and security
  • Voting systems analysis and security
  • Wireless and pervasive/ubiquitous computing security
  • Web security, including client-side and server-side security

Note that the USENIX Security Symposium is primarily a systems security conference. Papers whose contributions are primarily new cryptographic algorithms or protocols, cryptanalysis, electronic commerce primitives, etc., may not be appropriate for this conference.

Program committee members are limited to being authors or co-authors of at most two paper submissions. The program chair is not permitted to be author or co-author of any paper submissions.

Next page

? Need help?

Last changed: 12 Oct. 2010 ch
USENIX Security '11 Home
USENIX Home