posted by user: aircc_cfp || 4540 views || tracked by 3 users: [display]

CRYPIS 2017 : 6th International Conference on Cryptography and Information Security

FacebookTwitterLinkedInGoogle

Link: http://itcse.org/2017/crypis/index.html
 
When Jun 24, 2017 - Jun 25, 2017
Where Zurich, Switzerland
Submission Deadline May 28, 2017
Notification Due Jun 15, 2017
Final Version Due Jun 17, 2017
Categories    cryptography   information security   fuzzy systems   biometrics
 

Call For Papers

6th International Conference on Cryptography and Information Security (CRYPIS 2017)

June 24 ~ 25, 2017, Zurich, Switzerland

Download full Proceedings of CRYPIS 2016

Call for Papers

6th International Conference on Cryptography and Information Security (CRYPIS 2017) focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

Topics of Interest

  • Cryptographic Protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Coevolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission

Authors are invited to submit papers through the Conference Submission System by May 28, 2017. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & InformationTechnology (CS & IT) series(Confirmed).

Selected papers from CRYPIS 2017, after further revisions, will be published in an International Journal.

Important Dates

Submission Deadline:May 28, 2017
Authors Notification:June 15, 2017
Final Manuscript Due:June 17, 2017

Co - Located Event

Program Committee Members

  • A K M Arifuzzman, University of Alabama at Birmingham, USA
  • Ahmed H. Salem ,Old Dominion University, USA
  • Ahmed J. Jameel, Ahlia University, Bahrain
  • Alborzi, Nanyang Technological University, Singapore
  • Aleksandar Sugaris, ICT College , Serbia
  • Ameen Chilwan, Norwegian University of Science and Technology, Norway
  • Asmaa Shaker Ashoor, Babylon University, Iraq
  • Atallah M, AL-Shatnawi, Al al-Byte University, Jordan
  • Azeddine Chikh, University of Tlemcen, Algeria
  • Babar Shah, Zayed University ,UAE
  • Boukenadil Bahidja, University of Tlemcen, Algeria
  • Dimitris Kontoudis,University of Macedonia, Greece
  • Doina Bein, The Pennsylvania State University, USA
  • El Miloud Ar-reyouchi, Abdelmalek Essaadi University and SNRT, Morocco
  • Emilio Jiménez Macías, University of La Rioja, Spain
  • Erritali Mohammed, Sultan Moulay Slimane University, Morocco

... More

Related Resources

DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
WCCI 2018   World Congress on Computational Intelligence
ISC 2018   21st Information Security Conference
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
SECRYPT 2018   15th International Conference on Security and Cryptography
IJMSA 2017   International Journal of Modeling, Simulation and Applications
DRIJ 2017   Dental Research: An International Journal
BSidesMunich 2018   BSides Munich 2018 Security Conference
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ICITA 2018   International Conference on Information Technology and Applications