ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICCCIS 2012 - International Conference on Cryptography, Coding and Information Security (ICCCIS 2012)

Date2012-11-14

Deadline2012-06-29

VenueVe nice, Italy Italy

Keywords

Websitehttps://www.waset.org/events.php

Topics/Call fo Papers

The VIII. International Conference on Cryptography, Coding and Information Security is the premier forum for the presentation of new advances and research results in the fields of Cryptography, Coding and Information Security. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to:

Computational Intelligence in Security
Artificial Immune Systems
Biological Computing
Evolutionary Computation
Intelligent Agents and Systems
Machine Learning
Support Vector Machine
Reinforcement Learning
Unsupervised Learning
Autonomy-Oriented Computing
Coevolutionary Algorithms
Fuzzy Systems
Molecular Computing
Neural Computing
Swarm Intelligence
Probabilistic Reasoning

Information Security
Cryptographic Protocols
Detection of Abnormality
Information Storage and Retrieval System
Information Security Management
Information Hiding
Network & Wireless Security
Security Models and Architectures
Web and Wireless Security
Cryptography and Coding
Electronic Commerce Security
Information, Data and System Integrity
Intrusion Detection
Mobile Code & Agent Security
Security Analysis Methodologies
Steganography and watermarking

Access Control and Intrusion Detection
Intrusion Detection and Vulnerability Assessment
Authentication and Non-repudiation
Identification and Authentication
Insider Threats and Countermeasures
Intrusion Detection & Prevention
Identity and Trust Management
Biometric Security
Trust models and metrics
Regulation and Trust Mechanisms
Data Integrity
Models for Authentication, Trust and Authorization
Access Control in Computing Environments
Multiuser Information

Network Security and Protocols
IPsec, VPNs and encryption modes
Service and Systems Design and QoS Network Security
Fairness Scheduling and QoS Guarantee
Reliability and Dependability
Web Performance and Reliability
Denial of Service and other attacks
Data and Systems Security
Data Access & Synchronization
GPRS and CDMA Security
Mobile System Security
Ubiquitous Computing Security
Security in Localization systems
Sensor and Mobile Ad Hoc Network Security
Wireless Network Security (WiFi, WiMAX, WiMedia and others)
Security of GSM/GPRS/UMTS systems
Peer-to-Peer Security
E-commerce protocols and micropayment schemes

Cryptographic Techniques and Key Management
Smart Card Security
Public Key Crypto Applications
Coding Theory and Practice
Spread Spectrum Systems
Speech/Image Coding
Shannon Theory
Stochastic Processes
Quantum Information Processing
Mobile Code & Agent Security
Digital Rights Management

Information Assurance
Planning Security
Risk Assessment
Security Area Control
Organizational Security Policies and Responsability
Security Through Collaboration
Human Factors and Human Behaviour Recognition Techniques
Ethical and Legal Implications
Intrusive, Explicit Security vs. Invisible, Implicit Computing
Information Hiding
Information Systems Auditing
Management of Computing Security

Security in Information Systems
Security for Grid Computing
Secure Software Development Methodologies
Security for Web Services
Security for Databases and Data Warehouses
E-Health
Security Engineering
Security Information Systems Architectures
Security requirements
Security Metrics
Personal Data Protection
XML Security
Workflow and Business Process Security

Applications
Bioinformatics and Medical Diagnosis
Copyright Protection
Data Mining
Detection of Hidden
Digital Signatures
Financial engineering
Intelligent Information Retrieval
Financial Engineering
BSS & ICA
Cryptography and Its Applications
Data Privacy
Communication Channels
Electronic Commerce Security
Image and Signal Processing
Pattern Recognition
Web and Network Application Contact us: info-AT-waset.org

Last modified: 2011-06-29 16:38:51