ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICISSP Secretariat 2015 - 1st International Conference on Information Systems Security and Privacy - ICISSP 2015

Date2015-02-09 - 2015-02-11

Deadline2014-09-09

VenueESEO, Angers, Loire Valley, France, France France

Keywords

Websitehttp://icissp.secretariat@insticc.org

Topics/Call fo Papers

Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:
1. DATA AND SOFTWARE SECURITY
2. TRUST
3. PRIVACY AND CONFIDENTIALITY
4. MOBILE SYSTEMS SECURITY
5. BIOMETRIC AUTHENTICATION
AREA 1: DATA AND SOFTWARE SECURITY
? Security Frameworks, Architectures and Protocols
? Cryptographic Algorithms
? Artificial Intelligence and Security
? Information Hiding and Anonymity
? Vulnerability Analysis and Countermeasures
? Data Integrity
? Database Security
? Content Protection and Digital Rights Management
? Data Mining
? Software Security Assurance
? Security Architecture and Design Analysis
? Security Testing
? Middleware Security
? Data Fraud and Data Fabrication
AREA 2: TRUST
? Computational Models of Trust
? Risk and Reputation Management
? Phishing
? Security and Trust in Pervasive Information Systems
? E-Commerce and Contract Management Tools
? Trusted Platforms
? P2P Transactions and Scenarios
? Common Practice, Legal and Regulatory Issues
? Trust in Social Networks
? Identity and Trust Management
? Intrusion Detection
? Smartcard Technology
? Trustworthy Embedded Devices
? Electronic Payment Fraud
AREA 3: PRIVACY AND CONFIDENTIALITY
? Privacy-Enhancing Models and Technologies
? Network Deployment and Management
? Web Applications and Services
? Privacy In Cloud and Pervasive Computing
? Authentication, Privacy and Security Models
? Privacy Compliance in Organizations
? Social Media Privacy
? User Profiling in E-Commerce Systems
? E-Voting and Privacy
? Privacy Metrics and Control
? Malware Detection
? Electronic Abuse Protection
? Ethics
AREA 4: MOBILE SYSTEMS SECURITY
? Location-based Services
? GPS-based security
? Mobile Sensing and Sensor Networks
? Bluetooth and RFID Security
? Privacy in Wireless Communications
? Mobile Applications Control
? Privacy-Preserving Protocols
? Vehicular Systems and Networks
? Secure Routing
? Software Vulnerabilities
? Access Control
? Threat Awareness
AREA 5: BIOMETRIC AUTHENTICATION
? Identification and Access Control
? Feature Detection, Selection and Extraction
? Biosignals in Biometrics
? Physiological Signal Processing
? Fingerprint, Face or Iris Recognition
? Hand Geometry
? Gait Analysis
? Speaker Recognition and Voice Analysis
? Behavioral Patterns
? Keystroke Dynamics
? Surveillance
? Privacy Concerns with Biometrics
? Multimodal Biometrics Systems
? Knowledge Discovery in Biometric Databases

Last modified: 2014-06-27 02:25:55