posted by user: jmheralds || 6525 views || tracked by 20 users: [display]

ISP 2010 : 2010 International Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.promoteresearch.org
 
When Jul 12, 2010 - Jul 14, 2010
Where Orlando, USA
Submission Deadline May 31, 2010
Categories    security   cryptography   computer networks   privacy
 

Call For Papers

The scope of the conference includes all areas of information security, privacy, cryptography and all related areas. Sample topics include but WILL NOT be limited to:

* Access Control
* Accounting and Audit
* Agent and Mobile Code Security
* Anonymity and Pseudonymity
* Antitamper and TEMPEST
* Applied Cryptography
* Attacks and Prevention of Online Fraud
* Authentication, Authorization and Access Control
* Authentication and Nonrepudiation
* Biometrics
* Block/Stream Ciphers
* Cell phone, PDA and Potable Device Security
* Computer Forensics
* Copyright Protection
* Cryptanalysis
* Cryptographic Protocols and Functions
* Cyberattack and Cyberterrorism
* Data Integrity and Privacy
* Database and System Security
* Design and Analysis of Cryptographic Algorithms
* Digital Rights Management
* Digital Signatures
* Distributed System Security
* Ebomb and Electronic Attack
* ECommerce and EGovernment Security
* Economics of Security and Privacy
* Efficient Implementations
* Electronic Commerce
* Elliptic Curve Cryptosystems
* Firewall, IDS, Antivirus and other Security Products
* Formal Methods in Security
* Foundations of Computer Security
* Hash Functions
* Identity and Trust Management
* Information Hiding and Watermarking
* Information Warfare and Countermeasures
* Infrastructure Security
* Intellectual Property Protection
* Internet and Web Services Security
* Intranet Security
* Intrusion Detection, Tolerance and Prevention
* Key Management and Recovery
* Key/Identity Management
* Malicious Codes
* Mobile and Ad hoc network security
* Mobile, Ad Hoc and Sensor and Wireless Network Security
* New Theory and Paradigms for Security
* Operating System Security
* Peer-to-Peer Network Security
* Personnel Security and Privacy
* Physical Security and Soldier Security
* PKI and PMI
* Private Searches
* Public Key Cryptosystems
* Public Key Infrastructure
* RFID, Sensor Network, Ubiquitous Computing Security
* Secret Sharing
* Secure Hardware and Software Design
* Security and Privacy in Pervasive/Ubiquitous Computing
* Security Education and Training
* Security Engineering and Its Application
* Security Evaluation Criteria and Methodology
* Security for Mobile Code
* Security in Development Processes
* Security in Information Flow
* Security in System/Software/Product Development Site
* Security Level Definition Criteria and Its Application
* Security Management
* Security Maturity Model
* Security Modeling and Architectures
* Security Models for Ambient Intelligence environments
* Security of eCommerce, eBusiness and eGovernment
* Security of Grid Computing
* Security Policy, Strategy and Management
* Security Requirements Engineering
* Sensortoshooter/Command Control System Security
* Smart/Java Cards
* Smartcards and Chip Security
* Special Session on Hashing
* Tactical Communication and Network Security
* Trust Negotiation, Establishment and Management
* Trusted Computing
* Usable Security
* Vulnerability, Threat, and Risk Analysis
* Zero Knowledge



Related Resources

ISD 2020   29th International Conference on Information Systems Development
SP 2020   IEEE Symposium on Security and Privacy
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
CANS 2020   Cryptology and Network Security
SIPRO 2020   6th International Conference on Signal and Image Processing
IEEE--ICISPP--Ei Compendex, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
IFIP SEC 2020   35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security