posted by user: jmheralds || 5548 views || tracked by 20 users: [display]

ISP 2010 : 2010 International Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.promoteresearch.org
 
When Jul 12, 2010 - Jul 14, 2010
Where Orlando, USA
Submission Deadline May 31, 2010
Categories    security   cryptography   computer networks   privacy
 

Call For Papers

The scope of the conference includes all areas of information security, privacy, cryptography and all related areas. Sample topics include but WILL NOT be limited to:

* Access Control
* Accounting and Audit
* Agent and Mobile Code Security
* Anonymity and Pseudonymity
* Antitamper and TEMPEST
* Applied Cryptography
* Attacks and Prevention of Online Fraud
* Authentication, Authorization and Access Control
* Authentication and Nonrepudiation
* Biometrics
* Block/Stream Ciphers
* Cell phone, PDA and Potable Device Security
* Computer Forensics
* Copyright Protection
* Cryptanalysis
* Cryptographic Protocols and Functions
* Cyberattack and Cyberterrorism
* Data Integrity and Privacy
* Database and System Security
* Design and Analysis of Cryptographic Algorithms
* Digital Rights Management
* Digital Signatures
* Distributed System Security
* Ebomb and Electronic Attack
* ECommerce and EGovernment Security
* Economics of Security and Privacy
* Efficient Implementations
* Electronic Commerce
* Elliptic Curve Cryptosystems
* Firewall, IDS, Antivirus and other Security Products
* Formal Methods in Security
* Foundations of Computer Security
* Hash Functions
* Identity and Trust Management
* Information Hiding and Watermarking
* Information Warfare and Countermeasures
* Infrastructure Security
* Intellectual Property Protection
* Internet and Web Services Security
* Intranet Security
* Intrusion Detection, Tolerance and Prevention
* Key Management and Recovery
* Key/Identity Management
* Malicious Codes
* Mobile and Ad hoc network security
* Mobile, Ad Hoc and Sensor and Wireless Network Security
* New Theory and Paradigms for Security
* Operating System Security
* Peer-to-Peer Network Security
* Personnel Security and Privacy
* Physical Security and Soldier Security
* PKI and PMI
* Private Searches
* Public Key Cryptosystems
* Public Key Infrastructure
* RFID, Sensor Network, Ubiquitous Computing Security
* Secret Sharing
* Secure Hardware and Software Design
* Security and Privacy in Pervasive/Ubiquitous Computing
* Security Education and Training
* Security Engineering and Its Application
* Security Evaluation Criteria and Methodology
* Security for Mobile Code
* Security in Development Processes
* Security in Information Flow
* Security in System/Software/Product Development Site
* Security Level Definition Criteria and Its Application
* Security Management
* Security Maturity Model
* Security Modeling and Architectures
* Security Models for Ambient Intelligence environments
* Security of eCommerce, eBusiness and eGovernment
* Security of Grid Computing
* Security Policy, Strategy and Management
* Security Requirements Engineering
* Sensortoshooter/Command Control System Security
* Smart/Java Cards
* Smartcards and Chip Security
* Special Session on Hashing
* Tactical Communication and Network Security
* Trust Negotiation, Establishment and Management
* Trusted Computing
* Usable Security
* Vulnerability, Threat, and Risk Analysis
* Zero Knowledge



Related Resources

DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
CIKM 2018   International Conference on Information and Knowledge Management
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
MathSJ 2018   Applied Mathematics and Sciences: An International Journal
SciSec 2018   The 1st International Conference on Science of Cyber Security
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
SECURWARE 2018   The Twelfth International Conference on Emerging Security Information, Systems and Technologies
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus