posted by user: jmheralds || 5816 views || tracked by 20 users: [display]

ISP 2010 : 2010 International Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.promoteresearch.org
 
When Jul 12, 2010 - Jul 14, 2010
Where Orlando, USA
Submission Deadline May 31, 2010
Categories    security   cryptography   computer networks   privacy
 

Call For Papers

The scope of the conference includes all areas of information security, privacy, cryptography and all related areas. Sample topics include but WILL NOT be limited to:

* Access Control
* Accounting and Audit
* Agent and Mobile Code Security
* Anonymity and Pseudonymity
* Antitamper and TEMPEST
* Applied Cryptography
* Attacks and Prevention of Online Fraud
* Authentication, Authorization and Access Control
* Authentication and Nonrepudiation
* Biometrics
* Block/Stream Ciphers
* Cell phone, PDA and Potable Device Security
* Computer Forensics
* Copyright Protection
* Cryptanalysis
* Cryptographic Protocols and Functions
* Cyberattack and Cyberterrorism
* Data Integrity and Privacy
* Database and System Security
* Design and Analysis of Cryptographic Algorithms
* Digital Rights Management
* Digital Signatures
* Distributed System Security
* Ebomb and Electronic Attack
* ECommerce and EGovernment Security
* Economics of Security and Privacy
* Efficient Implementations
* Electronic Commerce
* Elliptic Curve Cryptosystems
* Firewall, IDS, Antivirus and other Security Products
* Formal Methods in Security
* Foundations of Computer Security
* Hash Functions
* Identity and Trust Management
* Information Hiding and Watermarking
* Information Warfare and Countermeasures
* Infrastructure Security
* Intellectual Property Protection
* Internet and Web Services Security
* Intranet Security
* Intrusion Detection, Tolerance and Prevention
* Key Management and Recovery
* Key/Identity Management
* Malicious Codes
* Mobile and Ad hoc network security
* Mobile, Ad Hoc and Sensor and Wireless Network Security
* New Theory and Paradigms for Security
* Operating System Security
* Peer-to-Peer Network Security
* Personnel Security and Privacy
* Physical Security and Soldier Security
* PKI and PMI
* Private Searches
* Public Key Cryptosystems
* Public Key Infrastructure
* RFID, Sensor Network, Ubiquitous Computing Security
* Secret Sharing
* Secure Hardware and Software Design
* Security and Privacy in Pervasive/Ubiquitous Computing
* Security Education and Training
* Security Engineering and Its Application
* Security Evaluation Criteria and Methodology
* Security for Mobile Code
* Security in Development Processes
* Security in Information Flow
* Security in System/Software/Product Development Site
* Security Level Definition Criteria and Its Application
* Security Management
* Security Maturity Model
* Security Modeling and Architectures
* Security Models for Ambient Intelligence environments
* Security of eCommerce, eBusiness and eGovernment
* Security of Grid Computing
* Security Policy, Strategy and Management
* Security Requirements Engineering
* Sensortoshooter/Command Control System Security
* Smart/Java Cards
* Smartcards and Chip Security
* Special Session on Hashing
* Tactical Communication and Network Security
* Trust Negotiation, Establishment and Management
* Trusted Computing
* Usable Security
* Vulnerability, Threat, and Risk Analysis
* Zero Knowledge



Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
IJOE 2018   International Journal on Organic Electronics
CODASPY 2019   ACM Conference on Data and Application Security and Privacy
NECO 2018   7thInternational Conference of Networks and Communications
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
NMOCT 2018   4th International Conference On Networks, Mobile Communications And Telematics
SCSN 2019   International Workshop on Semantic Computing for Social Networks and Organization Sciences: from user information to social knowledge
Secu_AgeBigData 2019   Combating Security Challenges in the Age of Big Data
NDSS 2019   Network and Distributed System Security Symposium