Does the paper represent a platform for future work

Assignment Help Other Subject
Reference no: EM131077044 , Length: word count:4000

Assignment - Infosec Conferences

Summary The world of information security conferences is split into two quite distinct streams - A) academic and B) industry/hacker. The purpose of Assignment is to introduce you to these, and to allow you to explore contemporary research in both streams.

Pick two conference talks or papers, one from a Group A conference and one from a Group B conference. Summarize and review each paper. Each summary and review should be 1200 - 1500 words long. Finally, add 500 - 1000 words summarizing the differences you have discovered between the two types of conferences and their submissions.

In reviewing each talk or paper, consider the following questions:

• What is the major contribution of the paper, in your opinion? Is it the same as the authors believe it to be? How significant is it?

• How original is the work? Does it report on a new and original idea?

• Who is the intended audience for this paper?

• Does the paper represent a platform for future work? Can readers or conference attendees use the ideas presented in their own work?

• The paper was accepted, or we would not be considering it here. Should it have been?

Group A: Academic Conferences

IEEE Conference on Communications and Network Security

2013: http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=30457

2014: http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=31964

2015: http://cns2015.ieee-cns.org/

IEEE TrustCom (IEEE International Conference on Trust, Security and Privacy in Computing and Communications)

2013: http://anss.org.au/trustcom2013/

2014: http://www.greenorbs.org/TrustCom2014/

2015: https://research.comnet.aalto.fi/Trustcom2015/

ACM SACMAT (Symposium on Access Control Models and Technologies)

2013: http://www.sacmat.org/2013/index.php

2014: http://www.sacmat.org/2014/index.php

2015: http://www.sacmat.org/2015/index.php

ACM CCS (Conference on Computer and Communications Security)

2013: http://www.sigsac.org/ccs/CCS2013/

2014: http://www.sigsac.org/ccs/CCS2014/

2015: http://www.sigsac.org/ccs/CCS2015/

Crypto

Proceedings are online at

2013: http://www.iacr.org/conferences/crypto2013/

2014: http://www.iacr.org/conferences/crypto2014/

2015: http://www.iacr.org/conferences/crypto2015/

Talks online at http://www.iacr.org/proceedings/ and via SpringerLink

Group B: Industry and Hacker Conferences

Chaos Communications Congress

2013: http://media.ccc.de/browse/congress/2013/

2014: http://media.ccc.de/browse/congress/2014/

2015: https://media.ccc.de/c/32c3

Black Hat (US)

2013: https://www.blackhat.com/us-13/archives.html

2014: https://www.blackhat.com/us-14/archives.html

2015: https://www.blackhat.com/us-15/briefings.html.

Reference no: EM131077044

Use a loop to act as a automatic withdrawal system

Use a loop to act as a automatic withdrawal system from a bank account. Assume the account has 1000 dollars to start with and money is taken from the account by the function:

Ethical obligations

Description of three ethical obligations of a defense attorney and three ethical obligations of a prosecuting attorney. Describe how the obligations are similar and different.

Importance of social science-integrate the term ontology

In a hundred words or less using the words and phases interrogate, taken for granted aspects of life, "they go without saying, because they come without saying," enculturate t

Identify the most serious ids in the world

At the end of this Module you should be able to articulate the following: Identify the most serious IDs in the world. Describe the trend and distribution of these diseases glo

Finding an appropriate support group

A mastectomy care plan should address psychosocial problems of patient. this should be directed toward helping patient express feelings and concerns.

Criminal justice assignment

Joshua has repeatedly teased and harassed Colin at their high school. On one occasion, Joshua and some other people abducted Colin and tied him to the flag post, partially n

Contrast the psychological and sociological

Compare and contrast the Psychological and Sociological viewpoints Are the traditional methods of classifying a generation still meaningful in a diverse and changing nation?

Essay outlining five to seven techniques to teach phonics

Eassay outlining five to seven techniques to teach phonics. Include differentiation strategies for ELLs, special needs and gifted students. In addition, include an assessment

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd