posted by user: cvarol || 7273 views || tracked by 15 users: [display]

ISDFS 2019 : 7th International Symposium on Digital Forensic and Security

FacebookTwitterLinkedInGoogle

Link: http://isdfs.org/
 
When Jun 10, 2019 - Jun 12, 2019
Where Barcelos, Portugal
Submission Deadline Apr 12, 2019
Notification Due Apr 30, 2019
Final Version Due May 5, 2019
Categories    digital forensics   cyber security   cryptography   computer science
 

Call For Papers

We are pleased to announce that The 7th International Symposium on Digital Forensic and Security (ISDFS 2019) will be held in Barcelos, Portugal, on June 10-12, 2019.The conference is technically sponsored by IEEE Section. The conference proceedings will be submitted for publication in the IEEE Xplore Digital Library.

ISDFS provides a platform for researchers and experts in academia, industry and government to exchange ideas and recent developments in digital forensics and security. After the several successful events, the seventh ISDFS conference will continue to promote and disseminate knowledge concerning several topics and technologies related to Digital Forensics and Security.

The symposium will be held by the “Polytechnic Institute of Cavado and Ave” in Barcelos, Portugal. Special sessions, workshops, tutorials, keynotes, panel discussions, poster and oral presentations will be included in the symposium program.

Topics within the scope of the symposium include, but are not limited to, the following areas:

Digital Forensics

Digital Forensics Process Model, Information Systems and Crime Analysis, Business Application of Digital Forensics, Digital Forensics Techniques and Tools, Legal and Policy Issues Related to Digital Forensics, Digital Forensics Case Studies, Database Forensics, Cloud Forensics, Mobile & Multimedia Forensics, Network Forensics, Digital Forensics Training and Education, Big Data and Digital Forensics, Cyber Forensics, Digital Forensics Tool Testing and Validation Process, Digital Forensics Trends, Digital Forensics & Law, Anti and Counter Forensics, Data Hiding and Recovery, Cyber Crime Investigations, Cyber Culture & Cyber Terrorism, Incident Response, Information Warfare & Critical Infrastructure Protection.

Data Privacy

Digital Signature, Certified Electronic Mail, Certificates and Certificate Management, Standards, Protocols, Trust Models, Key and Identity Management, Digital Signature Policies and Law, Validity of Digital Signature in Government, Finance, and Commerce, Effects of Digital Signature on Digital Signature Law, Responsibilities for Opponents to ESSP in Law in Digital Signature, Discrepancy between Digital Signatures, Judgments related to Digital Signatures, Digital Signature Law in Other Countries.

Cryptography

Block Ciphers, Stream Ciphers, Public Key Cryptography, Quantum Cryptography, Elliptic Curve Cryptography, Algebraic Curves in Cryptography, Homomorphic Encryption, Cryptographic Protocols, Zero Knowledge, Secret Sharing, Cryptanalysis, Hash Functions, Applications of Coding Theory in Cryptography
Smart Card Applications and Security, Cryptographic Hardware and Embedded Systems, Special Purpose Hardware for Attacking Cryptographic Systems, Side Channel Analysis and Countermeasures, Pairing Based Cryptography, Key and Identity Management.

Information Security

Steganography and Steganalysis, Secure Multiparty Computation, Biometric Approaches, Computer Security, Mobile Communications Security, Operating System Security, Trusted Computing, Network Security, Wireless Security, Database Security, IPTV Security, E-commerce Protocols, Content filtering and tracing, Distributed System Security, Security Weaknesses on Information Technologies, Secure Code Development, Penetration Tests, Intrusion Detection Systems, Malicious Codes and spyware, Viruses, Spyware, Spamware, Scam, Energy/Cost/Efficiency of Security in Clouds, Security Risk Models and Clouds, Security Standards and Practices.

Computer Science
All Areas of Computer Science, including Data Science, Data Mining, Networking, Databases, Computer Architecture, Data Quality, Operating Systems, Artificial Intelligence, Algorithms, Data structures, Analysis of Algorithms ( Complexities of time and space etc), Computational Geometry, Combinatorial Optimization, Automata theory, Computability theory, Complexity theory, Quantum Computation, Information theory, Coding theory, Type theory, Compiler design, Programming languages, Digital logic, Micro Architecture, Multi Processing, Ubiquitous Computing, Computer Applications, Parallel and Distributed Systems, Computer Graphics, Software Engineering.

At the end of the symposium, a Best Paper Award and a Best Student Presentation Award will be granted by the ISDFS 2018 Program Committee. In order to qualify for the award(s), at least one of the authors must register and the paper(s) must be presented.
Computer Science

Related Resources

ECCWS 2024   23rd European Conference on Cyber Warfare and Security
CTISC 2024   2024 6th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2024) -EI Compendex
ADIP--EI 2024   2024 6th Asia Digital Image Processing Conference (ADIP 2024)
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
IEEE WIFS 2024   16th IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS) 2024
CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex
ISDFS 2024   12th International Symposium on Digital Forensics and Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IEEE ICA 2022   The 6th IEEE International Conference on Agents
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust