CCS 2009 Call for Participation


OPENING KEYNOTE

Dorothy Denning
Distinguished Professor, Department of Defense Analysis
Naval Postgraduate School

TECHNICAL PROGRAM HIGHLIGHTS

Featuring 58 technical papers, on Applied Cryptography, Attacks, RFID, Privacy, Anonymization, Formal Techniques, Cloud Security, Security of Mobile Services, Security for Embedded and Mobile Devices, Systems and Networks Security, Software Security, Designing Secure Systems, Malware and Bots topics. The program also includes 5 tutorials, 12 workshops, and poster/demo session.

TUTORIALS

WORKSHOPS

Note:

If you register for one workshop, you can attend any other workshops in the same day.
Registration for short tutorial is included in the conference registration fees.
Complete programming information, registration and hotel reservation information can be found at http://www.sigsac.org/ccs/CCS2009/.