posted by user: Busra || 3254 views || tracked by 8 users: [display]

CRYPIS 2014 : Third International Conference on Cryptography and Information Security

FacebookTwitterLinkedInGoogle

Link: http://wimo2014.org/cryp/index.html
 
When Jul 12, 2014 - Jul 13, 2014
Where Sydney, Australia
Submission Deadline May 24, 2014
Notification Due Jun 23, 2014
Final Version Due Jun 25, 2014
Categories    cryptography   security   information security   cloud computing
 

Call For Papers

Third International Conference on cryptography and Information security ( CRYPIS 2014 )


July 12 ~ 13 , 2014 , Sydney , Australia


Scope & Topics


This Conference focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.


Topics of interest include, but are not limited to the following:

    • Cryptographic protocols

    • Cryptography and Coding

    • Untraceability

    • Privacy and authentication

    • Key management

    • Authentication

    • Trust Management

    • Quantum cryptography

    • Computational Intelligence in Security

    • Artificial Immune Systems

    • Biological & Evolutionary Computation

    • Intelligent Agents and Systems

    • Reinforcement & Unsupervised Learning

    • Autonomy-Oriented Computing

    • Coevolutionary Algorithms

    • Fuzzy Systems

    • Biometric Security

    • Trust models and metrics

    • Regulation and Trust Mechanisms

    • Data Integrity

    • Models for Authentication,Trust and Authorization

    • Access Control and Intrusion Detection

    • Intrusion Detection and Vulnerability Assessment

    • Authentication and Non-repudiation

    • Identification and Authentication

    • Insider Threats and Countermeasures

    • Intrusion Detection &Prevention

    • Secure Cloud Computing

    • Security Information Systems Architecture and Design and Security Patterns
    • Security Management

    • Security Requirements(threats, vulnerabilities, risk, formal methods, etc.)
    • Sensor and Mobile Ad Hoc Network Security

    • Service and Systems Design and QoS Network Security

    • Software Security

    • Security and Privacy in Mobile Systems

    • Security and Privacy in Pervasive/Ubiquitous Computing

    • Security and Privacy in Web Sevices

    • Security and Privacy Policies

    • Security Area Control

    • Security Deployment

    • Security Engineering

    • Security for Grid Computing

    • Security in Distributed Systems

Paper Submission


Authors are invited to submit papers through theConference Submission System ( Track:CRYPIS 2014 ) by May 24 , 2014. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from CRYPIS-2014, after further revisions, will be published in an International Journal (Approval Pending).


Important Dates :




Submission Deadline:May 24, 2014 ( Firm )
Paper Status Notification:June 23, 2014
Final Manuscript Due:June 25, 2014

Co - Located Event :

Related Resources

CRYPIS 2020   9th International Conference on Cryptography and Information Security
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
CIKM 2020   29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT
SP 2020   IEEE Symposium on Security and Privacy
EEIEJ 2020   Emerging Trends in Electrical, Electronics & Instrumentation Engineering: An international Journal
CCCIOT 2020   International Conference on Cloud Computing and IOT (CCCIOT 2020)
ICSFrontiers 2020   2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
IWCC 2020   9th International Workshop on Cyber Crime
SCI 2020   ACNS Workshop on Secure Cryptographic Implementation