ICSCCC 2020 - International Conference on Security in Computing and Cloud Computing 2020
Date2020-09-08 - 2020-09-09
Deadline2020-08-10
VenueLondon, UK - United Kingdom
KeywordsSecurity in Computing; Cloud Computing; Cloud Security; Encryption
Topics/Call fo Papers
Cloud Computing
Cloud Computing Architecture and Systems
Cloud Computing Models, Simulations, Designs, and Paradigms
Cloud Management and Operations
Dynamic Resource Provision and Consuming
Cloud Computing Technologies, Services and Applications
Cloud Security
Security Evaluation and Benchmarks Based on Cloud
Security Policy, Security Theory and Models Based on Big Data
Authentication, Authorization and Reliability Issues in Cloud
Security and Privacy in Cloud Computing
Information Security and Risks Management
Machine Learning for Security
Information Hiding
Coverless Information Hiding
Steganography and Steganalysis
Digital Watermarking, Fingerprinting and Forensics
Multimedia Authentication and Encryption
Covert/Subliminal Channels
IoT Security
Data Security and Privacy in the IoT
Attacks and Countermeasures on IoT Systems
Trust Model, Data Aggregation and Information Sharing
Secure Hardware and Software for IoT
Application Security for IoT
Multimedia Forensics
Active and Passive Forensics
Big Data Forensics
Portable electronic device forensics
Network Forensics
Anti-forensics
Encryption
Measurements for Cybersecurity
Post Quantum Cybersecurity
Visualization for Security
Applied Cryptography
Language-based Security
Cloud Computing Architecture and Systems
Cloud Computing Models, Simulations, Designs, and Paradigms
Cloud Management and Operations
Dynamic Resource Provision and Consuming
Cloud Computing Technologies, Services and Applications
Cloud Security
Security Evaluation and Benchmarks Based on Cloud
Security Policy, Security Theory and Models Based on Big Data
Authentication, Authorization and Reliability Issues in Cloud
Security and Privacy in Cloud Computing
Information Security and Risks Management
Machine Learning for Security
Information Hiding
Coverless Information Hiding
Steganography and Steganalysis
Digital Watermarking, Fingerprinting and Forensics
Multimedia Authentication and Encryption
Covert/Subliminal Channels
IoT Security
Data Security and Privacy in the IoT
Attacks and Countermeasures on IoT Systems
Trust Model, Data Aggregation and Information Sharing
Secure Hardware and Software for IoT
Application Security for IoT
Multimedia Forensics
Active and Passive Forensics
Big Data Forensics
Portable electronic device forensics
Network Forensics
Anti-forensics
Encryption
Measurements for Cybersecurity
Post Quantum Cybersecurity
Visualization for Security
Applied Cryptography
Language-based Security
Other CFPs
- 2nd World Congress on Lasers, Optics and Photonics
- Tips for Every Importer: The Basics of Importing
- Complexities of the Department of Transportation (DOT) Hazmat Requirements
- Service Level Agreements (SLAs) - Preparation Guidelines for Effective SLAs
- Determination of Limits of Detection in Chemical Forensic and Environmental Analysis
Last modified: 2019-11-02 19:29:15