START Conference Manager    

The 12th ACM Conference on Computer and Communications Security - Industry Track

CCS 2005

Submission Page


To revise a previous submission, please type in its passcode below, and press the ENTER button.

   

If you lost the passcode for your submission, please click HERE.


To make a new submission, please fill in the form below, and then press the submit button at the bottom.


Title of Submission:  


List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Affiliation
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20

More authors      Fewer authors


Contact Informaton:

Title 
First name*
Last name*
  Affiliation/organization*
       Affiliation Dept/Lab 
Phone*
Fax 
Email*
Country*
Address 
Address 
Address 
City/Town*
Zip/Postal Code*


Submission Category:

Please enter the category under which the submission should be reviewed.

Submission type:  


Summary:

Type (or cut-and-paste) a short summary for your submission. You must enter plain text only.

 


Submit Paper:

Your submission must be in one of the following document formats:

  • Adobe PDF (pdf)
  • Postscript (ps)
  • Microsoft Word (doc)
  • Rich Text (rtf)
  • Powerpoint Presentation (ppt)
  • Plain Text (txt)

The file's name should have the proper MIME extent associated with its document type. For example, a pdf file could have a name such as "mypaper.pdf".

Find the file containing your submission: 


Keywords/Topics:

Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

authentication
accounting and auditing
case studies
cryptographic protocols
database and system security
digital rights management
embedded systems security
experimental studies
failed-deployment lessons
information warfare
key management
large-scale deployments
privacy and anonymity
mobile-code security
security modelling
security verification
security insurance
access control
applied cryptography
cryptographic algorithms
data/system integrity
DoS detection and mitigation
e-business/e-commerce
enterprise security policy
intellectual-property protection
intrusion detection
physical security in computing
risk management
sensors and RFID
security issues in pervasive computing
security management
side-channel analysis
smart-cards and secure PDAs
 
 



START Conference Manager (V2.61.0 - Rev. 6236M)