posted by system || 5318 views || tracked by 14 users: [display]

ISPEC 2010 : The 6th Information Security practice and Experience Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security Practice and Experience
 
Link: http://cb-lab.sch.ac.kr/ISPEC2010/index.html
 
When May 6, 2010 - May 7, 2010
Where Seoul, Korea
Submission Deadline Dec 31, 2009
Notification Due Jan 31, 2010
Categories    cryptography   security
 

Call For Papers

As applications of information security technologies become pervasive, issues pertaining to their deployment and operation are becoming increasingly important. ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. In 2005, 2006, 2007, 2008, and 2009 the 1st, 2nd, 3rd, 4th, and 5th conferences were successfully held in Singapore, China, Hongkong, and Australia respectively. The conference proceedings were published by Springer as Lecture Notes in Computer Science. This 6th conference ISPEC 2010 will be held in Seoul, Korea, May 12-13, 2010. Again, we plan to publish the conference proceedings in a volume of Springer LNCS.



Hosted by,
  SCH University, Korea


Supported by,
  KISA(Korea Information Security Agency)


  ETRI(Electronics and Telecommunications Research Institute)


In Corporation with,
  KIISC (Korea Institute of Information Security & Cryptography)


Sponsored by,
  KCC (Korea Communications Commission)


Published by,
  LNCS (Lecture Notes in Computer Science)




TOPICS

We are inviting new and unpublished papers on, but not limited to, the following topics:

* Applications of cryptography
* Critical infrastructure protection
* Database system security
* Digital rights management
* Information security in vertical applications
* IT Product evaluation(CC)
* Legal and regulatory issues
* Multimedia contents security
* Multimedia system security
* Network security
* Privacy and anonymity
* Privacy issues in the use of smart cards and RFID systems
* Resilience and availability
* Risk evaluation and security certification
* Secure system architectures
* Security in e-commerce and e-business and other applications
* Security policy
* Security standards activities
* Trusted Computing
* Trust model and management
* Usability aspects of information security systems

Related Resources

ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IEEE--ICCT--Ei and Scopus 2019   2019 19th IEEE International Conference on Communication Technology (ICCT 2019)--Ei Compendex and Scopus
CryBlockSpecial 2018   Cryptocurrencies and Blockchains for Distributed Systems, (special issue) Concurrency and Computation: Practice and Experience, Wiley
ACNS 2019   International Conference on Applied Cryptography and Network Security
DBSEC 2019   33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
IJCSA 2018   International Journal on Computational Science & Applications
ISPEC 2018   The 14th International Conference on Information Security Practice and Experience
IoTBDS 2019   3rd International Conference on Internet of Things, Big Data and Security