posted by user: aircc_cfp || 1377 views || tracked by 3 users: [display]

CRYPIS 2017 : 6th International Conference on Cryptography and Information Security

FacebookTwitterLinkedInGoogle

Link: http://itcse.org/2017/crypis/index.html
 
When Jun 24, 2017 - Jun 25, 2017
Where Zurich, Switzerland
Submission Deadline May 28, 2017
Notification Due Jun 15, 2017
Final Version Due Jun 17, 2017
Categories    cryptography   information security   fuzzy systems   biometrics
 

Call For Papers

6th International Conference on Cryptography and Information Security (CRYPIS 2017)

June 24 ~ 25, 2017, Zurich, Switzerland

Download full Proceedings of CRYPIS 2016

Call for Papers

6th International Conference on Cryptography and Information Security (CRYPIS 2017) focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

Topics of Interest

  • Cryptographic Protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Coevolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission

Authors are invited to submit papers through the Conference Submission System by May 28, 2017. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & InformationTechnology (CS & IT) series(Confirmed).

Selected papers from CRYPIS 2017, after further revisions, will be published in an International Journal.

Important Dates

Submission Deadline:May 28, 2017
Authors Notification:June 15, 2017
Final Manuscript Due:June 17, 2017

Co - Located Event

Program Committee Members

  • A K M Arifuzzman, University of Alabama at Birmingham, USA
  • Ahmed H. Salem ,Old Dominion University, USA
  • Ahmed J. Jameel, Ahlia University, Bahrain
  • Alborzi, Nanyang Technological University, Singapore
  • Aleksandar Sugaris, ICT College , Serbia
  • Ameen Chilwan, Norwegian University of Science and Technology, Norway
  • Asmaa Shaker Ashoor, Babylon University, Iraq
  • Atallah M, AL-Shatnawi, Al al-Byte University, Jordan
  • Azeddine Chikh, University of Tlemcen, Algeria
  • Babar Shah, Zayed University ,UAE
  • Boukenadil Bahidja, University of Tlemcen, Algeria
  • Dimitris Kontoudis,University of Macedonia, Greece
  • Doina Bein, The Pennsylvania State University, USA
  • El Miloud Ar-reyouchi, Abdelmalek Essaadi University and SNRT, Morocco
  • Emilio Jiménez Macías, University of La Rioja, Spain
  • Erritali Mohammed, Sultan Moulay Slimane University, Morocco

... More

Related Resources

WICS 2017   4th International Workshop on Information and Communication Security
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
SoICT 2017   The Eighth International Symposium on Information and Communication Technology
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
4th IEEE ICIIP 2017   International Conference on Image Information Processing (ICIIP 2017)
ICIT - Ei 2017   2017 International Conference on Information Technology (ICIT 2017)--Ei Compendex, Scopus
IJFLS 2017   International Journal of Fuzzy Logic Systems
IJCIS 2017   International Journal on Cryptography and Information Security
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
ACM--ICNS 2017   ACM--2017 The 2nd International Conference on Network Security (ICNS 2017)--Ei Compendex and Scopus