ISTP 2012 - International Workshop on Information Security, Theory and Practice (ISTP-2012)
Date2012-12-10
Deadline2012-06-30
VenueLondon, UK - United Kingdom
Keywords
Websitehttps://www.icitst.org
Topics/Call fo Papers
Workshop Topics
Topics include but are not limited to:
Applied Cryptography
Chaos Generation
Chaos Characterization
Chaos Synchronization
Chaos-based Data Security
Chaos-based Crypto and Crypto-Compression Systems
Chaos based Steganography
Chaos-based Watermarking
Chaos-based Crypto-Biometric Schemes
Crypto-Biometric Systems
Dynamical Systems
Data IntegrityDatabase Security and Privacy
E-business Security
Iteration Theory
Identification, Authentication and Non-repudiation
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Peer-to-Peer Security
Personal Data Protection for Information Systems
Sensor and Mobile Ad Hoc Network Security
Security and Privacy in Mobile Systems
Service and Systems Design and QoS Network Security
Security Information Systems Architecture and Design and Security Patterns
Security and Privacy in Location-based Services
Secure Cloud Computing
Security and Privacy in Complex Systems
Security and Privacy in Social Networks
Security and Privacy in Web Services
Security in Distributed Systems
Security Verification and Validation
Software Security
Steganography
Watermarking
Wireless Network Security (UMTS, WiFi, WiMAX, WiMedia and others)
Topics include but are not limited to:
Applied Cryptography
Chaos Generation
Chaos Characterization
Chaos Synchronization
Chaos-based Data Security
Chaos-based Crypto and Crypto-Compression Systems
Chaos based Steganography
Chaos-based Watermarking
Chaos-based Crypto-Biometric Schemes
Crypto-Biometric Systems
Dynamical Systems
Data IntegrityDatabase Security and Privacy
E-business Security
Iteration Theory
Identification, Authentication and Non-repudiation
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Peer-to-Peer Security
Personal Data Protection for Information Systems
Sensor and Mobile Ad Hoc Network Security
Security and Privacy in Mobile Systems
Service and Systems Design and QoS Network Security
Security Information Systems Architecture and Design and Security Patterns
Security and Privacy in Location-based Services
Secure Cloud Computing
Security and Privacy in Complex Systems
Security and Privacy in Social Networks
Security and Privacy in Web Services
Security in Distributed Systems
Security Verification and Validation
Software Security
Steganography
Watermarking
Wireless Network Security (UMTS, WiFi, WiMAX, WiMedia and others)
Other CFPs
- 3rd International Workshop on Cloud Applications and Security
- The Conference for Consciousness and Human Evolution
- 2012 International Conference of User Science and Engineering
- 25th European Summer School in Logic, Language and Information
- The 2nd ACIKITA International Conference on Science and Technology (AICST)
Last modified: 2012-05-25 23:04:18