ICSST 2012 - 2012 International Conference on Security Science and Technology
Date2012-03-10
Deadline2012-01-20
VenueHong Kong, Hong Kong SAR
KeywordsSecurity Science; Technology
Websitehttp://www.icsst.org/
Topics/Call fo Papers
Call for Papers
2012 International Conference on Security Science and Technology (ICSST 2012) is the premier forum for the presentation of new advances and research results in the fields of theoretical, experimental, and applied Security Science and Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
Topics of interest for submission include, but are not limited to:
Access control and secure audit
Analysis of security protocols
Anonymity services
Authentication and Authorization
Avionics and Automobile Software
Biometrics
Computer Forensics
Content Production and Distribution Systems, Mobile and Multi-channel Systems
Context Awareness Computing
Critical Infrastructures Protection
Cryptographic primitives
Cryptography and its Applications
Data and Systems Integrity
Design and Analysis of Cryptosystems
Electronic Commerce Security
Electronic payment systems
Enforcement of security policies
Formal Methods and Approaches to Manage and Control Complex Systems
Fraud Control and Information Hiding
Human Factors and Collaborative Aspects
Information and Security Assurance
Integration of Heterogeneous Technologies
Intellectual Property Protection
Interoperability and Standardization
Intrusion Detection and Response
Key Management and Key Recovery
Language-based security
Mobile Communications Security
Network Security
Pervasive and Ubiquitous Computing
Privacy and identity management
Privacy Protection
Real-time and Embedded Systems
Risk Evaluation and Security Certification
Secure mobile code
Secure operating systems
Security and privacy in business services
Security engineering
Security in ubiquitous computing
Security Models
Security Protocols
Security requirements engineering
Security verification
Sensor Network Systems and Applications
Smart Cards
Software and System Development and Control Processes for Complex Systems
Software Architecture and System Engineering
Software Complexity Visualization
Software Protection
Systems and Software Safety and Security
Tools, Environments, and Languages for Complex Systems
Trust Management
Usable security
Verification Techniques for Complex Software Systems
Virtual Environments for Managing Complexity
Vulnerability and threat analysis
Watermarking
Web Services Modeling and Compositions
The selected papers of ICSST 2012 will be published in the IPCSIT (ISSN: 2010-460X) as one volume, and will be included in the Engineering & Technology Digital Library, and indexed by EBSCO, CNKI (中国知网), WorldCat, Google Scholar, and sent to be reviewed by Ei Compendex and ISI Proceedings.
SUBMISSION METHODS:
1. Electronic Submission System; ( .pdf)
If you can't login the submission system, please try to submit through method 2.
2. Email: icsst-AT-vip.163.com ( .pdf and .doc)
2012 International Conference on Security Science and Technology (ICSST 2012) is the premier forum for the presentation of new advances and research results in the fields of theoretical, experimental, and applied Security Science and Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
Topics of interest for submission include, but are not limited to:
Access control and secure audit
Analysis of security protocols
Anonymity services
Authentication and Authorization
Avionics and Automobile Software
Biometrics
Computer Forensics
Content Production and Distribution Systems, Mobile and Multi-channel Systems
Context Awareness Computing
Critical Infrastructures Protection
Cryptographic primitives
Cryptography and its Applications
Data and Systems Integrity
Design and Analysis of Cryptosystems
Electronic Commerce Security
Electronic payment systems
Enforcement of security policies
Formal Methods and Approaches to Manage and Control Complex Systems
Fraud Control and Information Hiding
Human Factors and Collaborative Aspects
Information and Security Assurance
Integration of Heterogeneous Technologies
Intellectual Property Protection
Interoperability and Standardization
Intrusion Detection and Response
Key Management and Key Recovery
Language-based security
Mobile Communications Security
Network Security
Pervasive and Ubiquitous Computing
Privacy and identity management
Privacy Protection
Real-time and Embedded Systems
Risk Evaluation and Security Certification
Secure mobile code
Secure operating systems
Security and privacy in business services
Security engineering
Security in ubiquitous computing
Security Models
Security Protocols
Security requirements engineering
Security verification
Sensor Network Systems and Applications
Smart Cards
Software and System Development and Control Processes for Complex Systems
Software Architecture and System Engineering
Software Complexity Visualization
Software Protection
Systems and Software Safety and Security
Tools, Environments, and Languages for Complex Systems
Trust Management
Usable security
Verification Techniques for Complex Software Systems
Virtual Environments for Managing Complexity
Vulnerability and threat analysis
Watermarking
Web Services Modeling and Compositions
The selected papers of ICSST 2012 will be published in the IPCSIT (ISSN: 2010-460X) as one volume, and will be included in the Engineering & Technology Digital Library, and indexed by EBSCO, CNKI (中国知网), WorldCat, Google Scholar, and sent to be reviewed by Ei Compendex and ISI Proceedings.
SUBMISSION METHODS:
1. Electronic Submission System; ( .pdf)
If you can't login the submission system, please try to submit through method 2.
2. Email: icsst-AT-vip.163.com ( .pdf and .doc)
Other CFPs
- The 1st Workshop on Sensor Networks & Data Engineering (SenDe2012)
- Workshop on Data Mining for Information Security and Privacy
- Workshop on Information Extraction & Knowledge Base Building (IEKB)
- 2012 4th International Conference on Machine Learning and Computing
- 22nd International Conference on Automated Planning and Scheduling
Last modified: 2011-12-26 13:14:30