This Conference focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.
Cryptographic protocols | Intrusion Detection and Vulnerability Assessment |
Cryptography and Coding Untraceability | Authentication and Non-repudiation |
Untraceability | Identification and Authentication |
Key management | Insider Threats and Countermeasures |
Authentication | Intrusion Detection & Prevention |
Trust Management | Secure Cloud Computing |
Quantum cryptography | Security Information Systems Architecture and Design and Security Patterns |
Computational Intelligence in Security | Security Management |
Artificial Immune Systems | Security Requirements (threats, vulnerabilities, risk, formal methods, etc.) |
Biological & Evolutionary Computation | Sensor and Mobile Ad Hoc Network Security |
Intelligent Information & Database Systems | Service and Systems Design and QoS Network Security |
Intelligent Agents and Systems | Software Security |
Reinforcement & Unsupervised Learning | Security and Privacy in Mobile Systems |
Autonomy-Oriented Computing | Security and Privacy in Pervasive/Ubiquitous Computing |
Coevolutionary Algorithms | Security and Privacy in Web Sevices |
Fuzzy Systems | Security and Privacy Policies |
Biometric Security | Security Area Control |
Trust models and metrics | Security Deployment |
Regulation and Trust Mechanisms | Security Engineering |
Data Integrity | Security for Grid Computing |
Models for Authentication, Trust and Authorization | Security in Distributed Systems |
Access Control and Intrusion Detection |
Selected papers from CRYPIS-2015, after further revisions, will be published in an International Journal (Approval Pending).