CRYPIS 2012 - International workshop on Cryptography and Information Security (CRYPIS-2012)
Topics/Call fo Papers
This workshop focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.
Topics of interest include, but are not limited to the following:
Cryptographic protocols
Cryptography and Coding
Untraceability
Privacy and authentication
Key management
Authentication
Trust Management
Quantum cryptography
Computational Intelligence in Security
Artificial Immune Systems
Biological & Evolutionary Computation
Intelligent Agents and Systems
Reinforcement & Unsupervised Learning
Autonomy-Oriented Computing
Coevolutionary Algorithms
Fuzzy Systems
Biometric Security
Trust models and metrics
Regulation and Trust Mechanisms
Data Integrity
Models for Authentication, Trust and Authorization
Access Control and Intrusion Detection
Intrusion Detection and Vulnerability Assessment
Authentication and Non-repudiation
Identification and Authentication
Insider Threats and Countermeasures
Intrusion Detection & Prevention
Secure Cloud Computing
Security Information Systems Architecture and Design and Security Patterns
Security Management
Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Web Sevices
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security for Grid Computing
Security in Distributed Systems
Paper Submission
Authors are invited to submit papers through the conference Submission system ( Track: CRYPIS-20122012 )by June 4, 2012. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by ACM- ACM International Conference Proceeding Series (ICPS) along with main conference Proceedings (Confirmed). ACM International Conference Proceeding Series (ICPS) will be available in ACM Digital Library
Selected papers from CRYPIS-2012WIT-2012, after further revisions, will be published in an International Journal (Approval Pending).
International Journal of Network Security & Its Applications ( IJNSA )
International Journal On Cryptography And Information Security ( IJCIS )
International Journal of Security, Privacy and Trust Management( IJSPTM )
Important Dates
Submission Deadline : June 04, 2012
Authors Notification : July 20, 2012
Final Manuscript Due : July 31, 2012
Topics of interest include, but are not limited to the following:
Cryptographic protocols
Cryptography and Coding
Untraceability
Privacy and authentication
Key management
Authentication
Trust Management
Quantum cryptography
Computational Intelligence in Security
Artificial Immune Systems
Biological & Evolutionary Computation
Intelligent Agents and Systems
Reinforcement & Unsupervised Learning
Autonomy-Oriented Computing
Coevolutionary Algorithms
Fuzzy Systems
Biometric Security
Trust models and metrics
Regulation and Trust Mechanisms
Data Integrity
Models for Authentication, Trust and Authorization
Access Control and Intrusion Detection
Intrusion Detection and Vulnerability Assessment
Authentication and Non-repudiation
Identification and Authentication
Insider Threats and Countermeasures
Intrusion Detection & Prevention
Secure Cloud Computing
Security Information Systems Architecture and Design and Security Patterns
Security Management
Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Web Sevices
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security for Grid Computing
Security in Distributed Systems
Paper Submission
Authors are invited to submit papers through the conference Submission system ( Track: CRYPIS-20122012 )by June 4, 2012. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by ACM- ACM International Conference Proceeding Series (ICPS) along with main conference Proceedings (Confirmed). ACM International Conference Proceeding Series (ICPS) will be available in ACM Digital Library
Selected papers from CRYPIS-2012WIT-2012, after further revisions, will be published in an International Journal (Approval Pending).
International Journal of Network Security & Its Applications ( IJNSA )
International Journal On Cryptography And Information Security ( IJCIS )
International Journal of Security, Privacy and Trust Management( IJSPTM )
Important Dates
Submission Deadline : June 04, 2012
Authors Notification : July 20, 2012
Final Manuscript Due : July 31, 2012
Other CFPs
- International workshop on Information Theory
- International workshop on Natural Language Processing
- The Fourth International Workshop on Wireless & Mobile Networks (WiMo-2012)
- The Fourth International Workshop on Computer Networks & Communications (CoNeCo-2012)
- 2013 IEEE Workshop on Robot Vision (WORV 2013)
Last modified: 2012-05-28 22:46:02