Instructions for Authors of Accepted Papers

Please revise your paper carefully according to the comments of the reviewers. Papers MUST BE formatted according to the guidelines of Springer Communications in Computer and Information Science (CCIS)Series. Failure to do so may result in the exclusion of your paper from the proceedings.

Please read the authors' instructions carefully before preparing your papers. Each paper is allowed to have 12 pages in the final camera-ready copy. At least one full paying author of each accepted paper must register for the conference before the deadline (January 05, 2014). Please note that this is a firm deadline to complete your registration - no further extensions will be given.

Before uploading your camera ready paper, please:

This is very important because we will be using the information provided in EDAS to generate the final conference program and the table of contents for Springer Proceedings. The abstract and title should be readable stand-alone and not contain any references or unexplained acronyms. You are allowed to modify abstract and author list yourself. You cannot modify the title for the paper, please send a mail to snds2014.iiitmk@gmail.com if that is necessary and give a valid reason.

Important Steps

1. Upload your Camera ready paper (Final Manuscript) in PDF format on EDAS.

2. Upload the source files of your camera ready paper (WORD or Latex) on EDAS. All Latex files should be submitted as a single zipped file. DOCX files are not accepted.

The camera ready paper should be formatted according to the Springer template. This template can be downloaded here:

3. Submit the copyright form in PDF or image formats from the "Copyright" column in the My papers table or the individual paper page of EDAS.

Each contribution must be accompanied by a Springer copyright form. One author may sign on behalf of all of the authors of a particular paper. In this case, the author signs for and accepts responsibility for releasing the material on behalf of any and all co-authors.

         Download Copyright Form

Please make sure that you have entered the following details in the copyright form:

4. Complete your registration.

The Registration Instructions and online Registration Form can be accessed via http://www.iiitmk.ac.in/snds/reg.html. In order to register, please click the link for 'Online Registration' and fill the particulars carefully. After making payment by your preferred mode, please scan and send the signed form to: snds2014.iiitmk@gmail.com .

Registration confirmation email will be sent to you by the conference Secretariat upon receipt of your payment and subject to realization of your payment in to the bank account. Please forward your queries on registration to snds2014.iiitmk@gmail.com

Call for Papers


SNDS invites submissions containing original ideas that are relevant to the scope of the conference. Like other conferences, SNDS requires that papers not be submitted simultaneously to any other conferences or publications; that submissions not be previously published in peer-reviewed conferences; and that accepted papers not be subsequently published elsewhere. Papers describing work that was previously published in a peer-reviewed workshop are allowed, if the authors clearly describe what significant new content has been included.

Authors should submit their papers online. We use EDAS system for submission of papers and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here. The manuscripts should be submitted in PDF format. All submitted papers will be subjected to a "similarity test" by EDAS paper similarity checker. Papers achieving a high similarity score will be examined and those that are deemed unacceptable will be rejected/withdrawn without a formal review.

Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The contents will be included in the CCIS electronic book series hosted in the SpringerLink digital library.

Paper Length: 12 pages maximum

Springer Author Guidelines: PDF

Springer CCIS Manuscript Template: (Word format, LaTeX format)

All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All the accepted papers will be published in the conference proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.


We welcome submissions for SNDS-2014's Technical Program in the following areas and not limited to:

Track 1: Cryptosystems, Algorithms, Primitives

  • Cryptographic Algorithms, Hash Functions
  • Cryptographic Primitives and Security Protocols
  • Digital Signatures
  • Key Distribution and Management
  • Analysis of Security Protocols
  • Privacy, Anonymity and Untraceability
  • Identity Management
  • Provable Security
  • Efficient Implementation

Track 2: Security and Privacy in Networked Systems

  • P2P, Grid and Cloud
  • Mobile, Ad Hoc, VANET and Sensor Networks
  • Social Networks
  • Satellite Networks
  • Wireless Networks
  • Distributed Database Systems
  • E-Governance and E-commerce
  • Future Home Networks, Internet of Things, Body-area Networks, Pervasive Services

Track 3: System and Network Security

  • Secure Operating Systems
  • Malwares
  • Business Continuity & Disaster Recovery Planning
  • Insider Threats and Countermeasures
  • Hacking and Defending
  • Network Intrusion Detection and Prevention, Firewalls, Packet Filters
  • Network Security Policies: Implementation Deployment, Management
  • High Performance Security Systems
  • Securing Storage: SAN/NAS Security
  • Database and System Security
  • Internet Security & Applications: IPsec, VPNs and Encryption Modes
  • Web Security, Web Services and Enterprise Security
  • Access Controls and Security Mechanisms
  • Attack Data Acquisition and Network Monitoring
  • Secure Routing, Naming/Addressing, and Network Management
  • Security in Cellular and Content-delivery Networks
  • Security in High speed Network
  • Security in Optical Systems and Networks
  • Trustworthy Computing for Network Protocols and Distributed Systems
  • Forensics of Network and Distributed Systems
  • Public key Infrastructures, Key Management, Certification, and Revocation
  • Cyber warfare and Physical Security

Track 4: Multimedia Security

  • Digital Rights Management
  • Steganography and Digital Watermarking
  • Intelligent Multimedia Security Services
  • Image, Audio and Video Encryption Mechanisms
  • Security of VOIP and multimedia
  • Privacy and Security in Surveillance Videos
  • Multimedia Forensics
  • Visual Event Computation

Track 5: Security Modeling, Experiments, Simulation, and Tools

  • Security Metrics and Measurements
  • Security Models and Security Policies
  • Security Simulation and Tools
  • Tradeoff Analysis between Performance and Security
  • Automated Protocols Analysis
  • Large-scale Attacks and Defense
  • Implementation and Experimental Testbeds
  • Vulnerability Analysis

Track 6: Other Security Topics

  • Biometrics
  • Trust and Reputation
  • Security Issues in Software Engineering
  • Code Obfuscation
  • Hardware-based Security
  • Side Channel Attacks
  • Embedded System Security
  • Secure Mobile Agents and Mobile Code
  • Ethical and Legal Implications of Security and Privacy
  • Language-based Security
  • Security Standards
  • Security for Critical Infrastructures
  • Security in Pervasive/Ubiquitous Computing
  • Social and Human Implications of Security and Privacy
  • Active and Adaptive Defense Systems
  • Security and Privacy in Location-based Services and Complex Systems
  • Security Through Collaboration
  • Management of Computing Security
  • Information Assurance
  • Reliability and dependability
  • Policy Based Management for Security, Privacy and Trust

Best Paper Awards

As evaluated by TPC Chairs and TPC Members, THREE papers will be given Best Paper Award for SNDS-2014 viz 1st, 2nd and 3rd respectively. The above committee will expect the presentation of the selected best papers during the conference before finalizing the list. The winners will be declared during the conference.

Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):

Key Dates



 Full Paper Submission Ends November 10, 2013 November 13, 2013
 Acceptance Notification December 18, 2013
 Final paper Deadline January 5, 2014
 Author Registration Closes January 7, 2014
 Conference March 13 -14, 2014

Contact Us

Email: snds2014.iiitmk@gmail.com