posted by user: jmheralds || 10578 views || tracked by 20 users: [display]

ISP 2010 : 2010 International Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.promoteresearch.org
 
When Jul 12, 2010 - Jul 14, 2010
Where Orlando, USA
Submission Deadline May 31, 2010
Categories    security   cryptography   computer networks   privacy
 

Call For Papers

The scope of the conference includes all areas of information security, privacy, cryptography and all related areas. Sample topics include but WILL NOT be limited to:

* Access Control
* Accounting and Audit
* Agent and Mobile Code Security
* Anonymity and Pseudonymity
* Antitamper and TEMPEST
* Applied Cryptography
* Attacks and Prevention of Online Fraud
* Authentication, Authorization and Access Control
* Authentication and Nonrepudiation
* Biometrics
* Block/Stream Ciphers
* Cell phone, PDA and Potable Device Security
* Computer Forensics
* Copyright Protection
* Cryptanalysis
* Cryptographic Protocols and Functions
* Cyberattack and Cyberterrorism
* Data Integrity and Privacy
* Database and System Security
* Design and Analysis of Cryptographic Algorithms
* Digital Rights Management
* Digital Signatures
* Distributed System Security
* Ebomb and Electronic Attack
* ECommerce and EGovernment Security
* Economics of Security and Privacy
* Efficient Implementations
* Electronic Commerce
* Elliptic Curve Cryptosystems
* Firewall, IDS, Antivirus and other Security Products
* Formal Methods in Security
* Foundations of Computer Security
* Hash Functions
* Identity and Trust Management
* Information Hiding and Watermarking
* Information Warfare and Countermeasures
* Infrastructure Security
* Intellectual Property Protection
* Internet and Web Services Security
* Intranet Security
* Intrusion Detection, Tolerance and Prevention
* Key Management and Recovery
* Key/Identity Management
* Malicious Codes
* Mobile and Ad hoc network security
* Mobile, Ad Hoc and Sensor and Wireless Network Security
* New Theory and Paradigms for Security
* Operating System Security
* Peer-to-Peer Network Security
* Personnel Security and Privacy
* Physical Security and Soldier Security
* PKI and PMI
* Private Searches
* Public Key Cryptosystems
* Public Key Infrastructure
* RFID, Sensor Network, Ubiquitous Computing Security
* Secret Sharing
* Secure Hardware and Software Design
* Security and Privacy in Pervasive/Ubiquitous Computing
* Security Education and Training
* Security Engineering and Its Application
* Security Evaluation Criteria and Methodology
* Security for Mobile Code
* Security in Development Processes
* Security in Information Flow
* Security in System/Software/Product Development Site
* Security Level Definition Criteria and Its Application
* Security Management
* Security Maturity Model
* Security Modeling and Architectures
* Security Models for Ambient Intelligence environments
* Security of eCommerce, eBusiness and eGovernment
* Security of Grid Computing
* Security Policy, Strategy and Management
* Security Requirements Engineering
* Sensortoshooter/Command Control System Security
* Smart/Java Cards
* Smartcards and Chip Security
* Special Session on Hashing
* Tactical Communication and Network Security
* Trust Negotiation, Establishment and Management
* Trusted Computing
* Usable Security
* Vulnerability, Threat, and Risk Analysis
* Zero Knowledge



Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
AI Security & Privacy 2025   First International Workshop on Artificial Intelligence Security and Privacy
IEEE-ETEP 2025   2025 2nd International Conference on Energy Technology and Electrical Power-IEEE Xplore/EI/Scopus
CBMS 2025 - ST Security and Privacy 2025   CBMS 2025 - Special Track: Security and Privacy in Health Systems: Addressing Technology, Society, and Law
CODASPY 2026   The 16th ACM Conference on Data and Application Security and Privacy
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
Information Technology for Smart Healthc 2025   Information Technology for Smart Healthcare
EI/Scopus-ICMCCE 2025   2025 8th International Conference on Mechanical, Control and Computer Engineering-EI/Scopus