ISTP 2012 - International Workshop on Information Security, Theory and Practice (ISTP-2012)
Date2012-12-10
Deadline2012-06-30
VenueLondon, UK - United Kingdom
Keywords
Websitehttps://www.icitst.org
- EI Compendex. SCOPUS. CPCI-S(ISTP)、物理,数学,数学建模,信息技术,计算机科学 机械工程的所有方面 长期征稿 保证刊出和检索
- 【EI会议期刊】【ISTP】【会议期刊】会议 丛书征稿
- 【SCI、SSCI、A&HCI、EI、CSSCI、CPCI-S(ISTP)、CPCI-SSH(ISSHP)】化学与材料科学、计算机与通信、工程、地球科学与环境科学、物理与数学
- SCI、SSCI、A&HCI、EI、CSSCI、CPCI-S(ISTP)、CPCI-SSH(ISSHP)检索证明/刊源证明
- 【快速CPCI检索】【快速SCOPUS检索】【快速EI检索】几乎涵盖了所有学科,例如工程,自然科学,计算机和信息科学,ICT,经济学,商业,电子商务,环境,医疗保健,生命科学
Topics/Call fo Papers
Workshop Topics
Topics include but are not limited to:
Applied Cryptography
Chaos Generation
Chaos Characterization
Chaos Synchronization
Chaos-based Data Security
Chaos-based Crypto and Crypto-Compression Systems
Chaos based Steganography
Chaos-based Watermarking
Chaos-based Crypto-Biometric Schemes
Crypto-Biometric Systems
Dynamical Systems
Data IntegrityDatabase Security and Privacy
E-business Security
Iteration Theory
Identification, Authentication and Non-repudiation
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Peer-to-Peer Security
Personal Data Protection for Information Systems
Sensor and Mobile Ad Hoc Network Security
Security and Privacy in Mobile Systems
Service and Systems Design and QoS Network Security
Security Information Systems Architecture and Design and Security Patterns
Security and Privacy in Location-based Services
Secure Cloud Computing
Security and Privacy in Complex Systems
Security and Privacy in Social Networks
Security and Privacy in Web Services
Security in Distributed Systems
Security Verification and Validation
Software Security
Steganography
Watermarking
Wireless Network Security (UMTS, WiFi, WiMAX, WiMedia and others)
Topics include but are not limited to:
Applied Cryptography
Chaos Generation
Chaos Characterization
Chaos Synchronization
Chaos-based Data Security
Chaos-based Crypto and Crypto-Compression Systems
Chaos based Steganography
Chaos-based Watermarking
Chaos-based Crypto-Biometric Schemes
Crypto-Biometric Systems
Dynamical Systems
Data IntegrityDatabase Security and Privacy
E-business Security
Iteration Theory
Identification, Authentication and Non-repudiation
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Peer-to-Peer Security
Personal Data Protection for Information Systems
Sensor and Mobile Ad Hoc Network Security
Security and Privacy in Mobile Systems
Service and Systems Design and QoS Network Security
Security Information Systems Architecture and Design and Security Patterns
Security and Privacy in Location-based Services
Secure Cloud Computing
Security and Privacy in Complex Systems
Security and Privacy in Social Networks
Security and Privacy in Web Services
Security in Distributed Systems
Security Verification and Validation
Software Security
Steganography
Watermarking
Wireless Network Security (UMTS, WiFi, WiMAX, WiMedia and others)
Other CFPs
- 3rd International Workshop on Cloud Applications and Security
- The Conference for Consciousness and Human Evolution
- 2012 International Conference of User Science and Engineering
- 25th European Summer School in Logic, Language and Information
- The 2nd ACIKITA International Conference on Science and Technology (AICST)
Last modified: 2012-05-25 23:04:18