ISPEC 2013 - 9th Information Security Practice & Experience Conference
Topics/Call fo Papers
ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. The previous ISPEC conference series were successfully held in Singapore, Hangzhou, Hong Kong, Sydney, Xi’an, Seoul, Guangzhou, and Hangzhou. The 9th ISPEC will be held in the historic city Lanzhou, China, 12-14 May 2013 (right after AsiaCCS 2013, Hangzhou, China, 8-10 May 2013). ISPEC 2013 will be hosted by Lanzhou University of Technology.
Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to:
- Access control - Privacy and anonymity
- Applied cryptography - Risk evaluation and security certification
- Availability, resilience, and usability - Security of smart cards and RFID systems
- Cryptanalysis - Security policy
- Database Security - Security protocols
- Digital rights management - Security systems
- Information security in vertical applications - Trust model and management
- Multimedia security - Trusted computing
- Network security
Authors of accepted papers must guarantee that their papers will be presented at the conference. Papers accepted will be published in proceedings will be published by Springer's LNCS and available at the conference.
Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to:
- Access control - Privacy and anonymity
- Applied cryptography - Risk evaluation and security certification
- Availability, resilience, and usability - Security of smart cards and RFID systems
- Cryptanalysis - Security policy
- Database Security - Security protocols
- Digital rights management - Security systems
- Information security in vertical applications - Trust model and management
- Multimedia security - Trusted computing
- Network security
Authors of accepted papers must guarantee that their papers will be presented at the conference. Papers accepted will be published in proceedings will be published by Springer's LNCS and available at the conference.
Other CFPs
Last modified: 2012-08-29 22:37:00