ICCCIS 2012 - International Conference on Cryptography, Coding and Information Security (ICCCIS 2012)
Topics/Call fo Papers
The VIII. International Conference on Cryptography, Coding and Information Security is the premier forum for the presentation of new advances and research results in the fields of Cryptography, Coding and Information Security. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to:
Computational Intelligence in Security
Artificial Immune Systems
Biological Computing
Evolutionary Computation
Intelligent Agents and Systems
Machine Learning
Support Vector Machine
Reinforcement Learning
Unsupervised Learning
Autonomy-Oriented Computing
Coevolutionary Algorithms
Fuzzy Systems
Molecular Computing
Neural Computing
Swarm Intelligence
Probabilistic Reasoning
Information Security
Cryptographic Protocols
Detection of Abnormality
Information Storage and Retrieval System
Information Security Management
Information Hiding
Network & Wireless Security
Security Models and Architectures
Web and Wireless Security
Cryptography and Coding
Electronic Commerce Security
Information, Data and System Integrity
Intrusion Detection
Mobile Code & Agent Security
Security Analysis Methodologies
Steganography and watermarking
Access Control and Intrusion Detection
Intrusion Detection and Vulnerability Assessment
Authentication and Non-repudiation
Identification and Authentication
Insider Threats and Countermeasures
Intrusion Detection & Prevention
Identity and Trust Management
Biometric Security
Trust models and metrics
Regulation and Trust Mechanisms
Data Integrity
Models for Authentication, Trust and Authorization
Access Control in Computing Environments
Multiuser Information
Network Security and Protocols
IPsec, VPNs and encryption modes
Service and Systems Design and QoS Network Security
Fairness Scheduling and QoS Guarantee
Reliability and Dependability
Web Performance and Reliability
Denial of Service and other attacks
Data and Systems Security
Data Access & Synchronization
GPRS and CDMA Security
Mobile System Security
Ubiquitous Computing Security
Security in Localization systems
Sensor and Mobile Ad Hoc Network Security
Wireless Network Security (WiFi, WiMAX, WiMedia and others)
Security of GSM/GPRS/UMTS systems
Peer-to-Peer Security
E-commerce protocols and micropayment schemes
Cryptographic Techniques and Key Management
Smart Card Security
Public Key Crypto Applications
Coding Theory and Practice
Spread Spectrum Systems
Speech/Image Coding
Shannon Theory
Stochastic Processes
Quantum Information Processing
Mobile Code & Agent Security
Digital Rights Management
Information Assurance
Planning Security
Risk Assessment
Security Area Control
Organizational Security Policies and Responsability
Security Through Collaboration
Human Factors and Human Behaviour Recognition Techniques
Ethical and Legal Implications
Intrusive, Explicit Security vs. Invisible, Implicit Computing
Information Hiding
Information Systems Auditing
Management of Computing Security
Security in Information Systems
Security for Grid Computing
Secure Software Development Methodologies
Security for Web Services
Security for Databases and Data Warehouses
E-Health
Security Engineering
Security Information Systems Architectures
Security requirements
Security Metrics
Personal Data Protection
XML Security
Workflow and Business Process Security
Applications
Bioinformatics and Medical Diagnosis
Copyright Protection
Data Mining
Detection of Hidden
Digital Signatures
Financial engineering
Intelligent Information Retrieval
Financial Engineering
BSS & ICA
Cryptography and Its Applications
Data Privacy
Communication Channels
Electronic Commerce Security
Image and Signal Processing
Pattern Recognition
Web and Network Application Contact us: info-AT-waset.org
Computational Intelligence in Security
Artificial Immune Systems
Biological Computing
Evolutionary Computation
Intelligent Agents and Systems
Machine Learning
Support Vector Machine
Reinforcement Learning
Unsupervised Learning
Autonomy-Oriented Computing
Coevolutionary Algorithms
Fuzzy Systems
Molecular Computing
Neural Computing
Swarm Intelligence
Probabilistic Reasoning
Information Security
Cryptographic Protocols
Detection of Abnormality
Information Storage and Retrieval System
Information Security Management
Information Hiding
Network & Wireless Security
Security Models and Architectures
Web and Wireless Security
Cryptography and Coding
Electronic Commerce Security
Information, Data and System Integrity
Intrusion Detection
Mobile Code & Agent Security
Security Analysis Methodologies
Steganography and watermarking
Access Control and Intrusion Detection
Intrusion Detection and Vulnerability Assessment
Authentication and Non-repudiation
Identification and Authentication
Insider Threats and Countermeasures
Intrusion Detection & Prevention
Identity and Trust Management
Biometric Security
Trust models and metrics
Regulation and Trust Mechanisms
Data Integrity
Models for Authentication, Trust and Authorization
Access Control in Computing Environments
Multiuser Information
Network Security and Protocols
IPsec, VPNs and encryption modes
Service and Systems Design and QoS Network Security
Fairness Scheduling and QoS Guarantee
Reliability and Dependability
Web Performance and Reliability
Denial of Service and other attacks
Data and Systems Security
Data Access & Synchronization
GPRS and CDMA Security
Mobile System Security
Ubiquitous Computing Security
Security in Localization systems
Sensor and Mobile Ad Hoc Network Security
Wireless Network Security (WiFi, WiMAX, WiMedia and others)
Security of GSM/GPRS/UMTS systems
Peer-to-Peer Security
E-commerce protocols and micropayment schemes
Cryptographic Techniques and Key Management
Smart Card Security
Public Key Crypto Applications
Coding Theory and Practice
Spread Spectrum Systems
Speech/Image Coding
Shannon Theory
Stochastic Processes
Quantum Information Processing
Mobile Code & Agent Security
Digital Rights Management
Information Assurance
Planning Security
Risk Assessment
Security Area Control
Organizational Security Policies and Responsability
Security Through Collaboration
Human Factors and Human Behaviour Recognition Techniques
Ethical and Legal Implications
Intrusive, Explicit Security vs. Invisible, Implicit Computing
Information Hiding
Information Systems Auditing
Management of Computing Security
Security in Information Systems
Security for Grid Computing
Secure Software Development Methodologies
Security for Web Services
Security for Databases and Data Warehouses
E-Health
Security Engineering
Security Information Systems Architectures
Security requirements
Security Metrics
Personal Data Protection
XML Security
Workflow and Business Process Security
Applications
Bioinformatics and Medical Diagnosis
Copyright Protection
Data Mining
Detection of Hidden
Digital Signatures
Financial engineering
Intelligent Information Retrieval
Financial Engineering
BSS & ICA
Cryptography and Its Applications
Data Privacy
Communication Channels
Electronic Commerce Security
Image and Signal Processing
Pattern Recognition
Web and Network Application Contact us: info-AT-waset.org
Other CFPs
- International Conference on Medical Informatics and Biomedical Engineering (ICMIBE 2012)
- International Conference on Urban Planning and Regional Development (ICUPRD 2012)
- International Conference on Bioinformatics, Computational Biology and Biomedical Engineering (ICBCBBE 2012)
- International Conference on Image and Vision Computing (ICIVC 2012)
- International Conference on Urban Planning, Regional Development and Information Society (ICUPRDIS 2012)
Last modified: 2011-06-29 16:38:51