posted by user: ijcsi || 5043 views || tracked by 10 users: [display]

IJCSI - Security 2009 : CALL FOR PAPERS International Journal of Computer Science Issues - IJCSI - July 2009 - Security Systems and Technologies (Volume 2)

FacebookTwitterLinkedInGoogle

Link: http://www.ijcsi.org
 
When N/A
Where N/A
Submission Deadline Jul 3, 2009
Notification Due Jul 19, 2009
Categories    security   cryptography   mobile   internet
 

Call For Papers

CALL FOR PAPERS International Journal of Computer Science Issues - IJCSI - July 2009 - Security Systems and Technologies (Volume 2)

Deadline: 03 July 2009
Notification: 19 July 2009
Online Publication: 31 July 2009

The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling

Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance

Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security

Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services

Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability

Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning

Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./

Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems

For other information, please contact IJCSI Managing Editor, (editor@ijcsi.org)
Website: http://www.ijcsi.org

Related Resources

ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
DSIT 2024   2024 7th International Conference on Data Science and Information Technology (DSIT 2024)
CSW 2024   2024 3rd International Conference on Cyber Security
Call For Papers Special Issue 2024   Smart Cities, innovating in the Transformation of Urban Environments
CRBL 2024   International Conference on Cryptography and Blockchain
ADMIT 2024   2024 3rd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2024)
ACIJ 2024   Advanced Computing: An International Journal