posted by user: FUN0524 || 2909 views || tracked by 7 users: [display]

ICINS 2015 : 2015 2nd International Conference on Information and Network Security


When Jul 29, 2015 - Jul 30, 2015
Where Shanghai, China
Submission Deadline May 15, 2015
Notification Due Jun 5, 2015
Final Version Due Jun 20, 2015
Categories    information security   network security   electronics

Call For Papers

2015 2nd International Conference on Information and Network Security (ICINS 2015)
July 29-30, 2015
Shanghai, China

All accepted papers will be selected and published in One of the following Journals.
-- WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517)
Indexed by EI Compendex, Scopus and ISI.
-- International Journal of Communications (JCM, 1796-2021)
Indexed by Scopus and EI Compendex

Security of Web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Intrusion prevention, detection, and response
Security for electronic voting
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Network perimeter controls: firewalls, packet filters, and application gateways
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Security for Vehicular Ad-hoc Networks (VANETs)
Security for peer-to-peer and overlay network systems
Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
Implementation, deployment and management of network security policies
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Integrating security services with system and application security facilities and protocols
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
Security for large-scale systems and critical infrastructures
Integrating security in Internet protocols: routing, naming, network management
For more topics:

Submission method:
Electronic Submission System; ( .pdf)

Contact us:
Ms. Yashin Tu
Tel: +1-518-478-2659

Related Resources

CANS 2020   Cryptology and Network Security
CSIA 2019   10th International Conference on Communications Security & Information Assurance
ISD 2020   29th International Conference on Information Systems Development
Cyber Security 2020   IEEE International Conference on Cyber Security and Protection of Digital Services
ICISPP--IEEE, Ei, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
IJNSA 2019   International Journal of Network Security & Its Applications- ERA Listed
ICSFrontiers 2020   2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)
NC 2020   8th International Conference of Networks and Communications
MobiWis 2020   The 17th International Conference on Mobile Web and Intelligent Information Systems
NCWMC 2020   5th International Conference on Networks, Communications, Wireless and Mobile Computing