Security 2011 - ITST-2011 “Security and Applications” Workshop
Topics/Call fo Papers
Topics include the following but are not limited to them:
? Intrusion Detection and Prevention
? Cryptographic Protocols & Biometrics
? Information Hiding and Watermarking
? Risk, Response and Recovery
? Validation and Verification of Security
? Identity and Trust Management
? Cloud security techniques
? Software and Information technology,
? Communication Technology and applications
? Applications Architectures and Models
? Intelligent Applications
? Applications over distributed databases
? Multimedia Applications
? Routing for Intelligent Networks
? Testing Requirements
? Testing Methods
? Intrusion Detection and Prevention
? Cryptographic Protocols & Biometrics
? Information Hiding and Watermarking
? Risk, Response and Recovery
? Validation and Verification of Security
? Identity and Trust Management
? Cloud security techniques
? Software and Information technology,
? Communication Technology and applications
? Applications Architectures and Models
? Intelligent Applications
? Applications over distributed databases
? Multimedia Applications
? Routing for Intelligent Networks
? Testing Requirements
? Testing Methods
Other CFPs
- 4th International Conference on Human-Environment System
- International Workshop on SImulation Models and Techniques for Intelligent Mobility (SIMTIM -2011)
- Workshop on Vulnerable Road Users Protection
- International Workshop on Context Aware Middleware for Ubiquitous Computing Environments
- Cognitive and context aware intelligence in vehicular systems
Last modified: 2011-03-15 23:23:17