ICSCCC 2021 - International Conference on Security in Computing and Cloud Computing
Date2021-08-11 - 2021-08-12
Deadline2021-07-10
VenueHong Kong, Hong Kong SAR
KeywordsSecurity; Computing; Cloud
Topics/Call fo Papers
Tracks of the Conference
Cloud Computing
Cloud Computing Architecture and Systems
Cloud Computing Models, Simulations, Designs, and Paradigms
Cloud Management and Operations
Dynamic Resource Provision and Consuming
Cloud Computing Technologies, Services and Applications
Cloud Security
Security Evaluation and Benchmarks Based on Cloud
Security Policy, Security Theory and Models Based on Big Data
Authentication, Authorization and Reliability Issues in Cloud
Security and Privacy in Cloud Computing
Information Security and Risks Management
Machine Learning for Security
Information Hiding
Coverless Information Hiding
Steganography and Steganalysis
Digital Watermarking, Fingerprinting and Forensics
Multimedia Authentication and Encryption
Covert/Subliminal Channels
IoT Security
Data Security and Privacy in the IoT
Attacks and Countermeasures on IoT Systems
Trust Model, Data Aggregation and Information Sharing
Secure Hardware and Software for IoT
Application Security for IoT
Multimedia Forensics
Active and Passive Forensics
Big Data Forensics
Portable electronic device forensics
Network Forensics
Anti-forensics
Encryption
Measurements for Cybersecurity
Post Quantum Cybersecurity
Visualization for Security
Applied Cryptography
Language-based Security
Cloud Computing
Cloud Computing Architecture and Systems
Cloud Computing Models, Simulations, Designs, and Paradigms
Cloud Management and Operations
Dynamic Resource Provision and Consuming
Cloud Computing Technologies, Services and Applications
Cloud Security
Security Evaluation and Benchmarks Based on Cloud
Security Policy, Security Theory and Models Based on Big Data
Authentication, Authorization and Reliability Issues in Cloud
Security and Privacy in Cloud Computing
Information Security and Risks Management
Machine Learning for Security
Information Hiding
Coverless Information Hiding
Steganography and Steganalysis
Digital Watermarking, Fingerprinting and Forensics
Multimedia Authentication and Encryption
Covert/Subliminal Channels
IoT Security
Data Security and Privacy in the IoT
Attacks and Countermeasures on IoT Systems
Trust Model, Data Aggregation and Information Sharing
Secure Hardware and Software for IoT
Application Security for IoT
Multimedia Forensics
Active and Passive Forensics
Big Data Forensics
Portable electronic device forensics
Network Forensics
Anti-forensics
Encryption
Measurements for Cybersecurity
Post Quantum Cybersecurity
Visualization for Security
Applied Cryptography
Language-based Security
Other CFPs
- International Conference on Law and Political Science
- International Conference on Artificial Neural Networks
- International Conference on Network Security and Computer Engineering
- International Conference on Computer Application and Information Technology
- International Conference on Chemical and Biological Sciences
Last modified: 2020-11-29 02:41:59