ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WCE 2010 - The 2010 International Conference of Information Security and Internet Engineering

Date2010-06-30

Deadline2010-03-06

VenueLondon, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttp://www.iaeng.org/WCE2010/

Topics/Call fo Papers

The 2010 International Conference of Information Security and Internet Engineering
London, U.K., 30 June - 2 July, 2010


Conferences Publications Membership About IAENG FAQ Contact Us



The 2010 International Conference of Information Security and Internet Engineering (ICISIE'10) will take place in London, U.K., 30 June - 2 July, 2010.



The conference ICISIE'10 is held under the World Congress on Engineering 2010. The WCE 2010 is organized by the International Association of Engineers (IAENG), and serves as good platforms for the engineering community members to meet with each other and to exchange ideas. The last IAENG conferences attracted more than one thousand participants from over 30 countries. All submitted papers will be under peer review and accepted papers will be published in the conference proceeding (ISBN: 978-988-17012-9-9). The abstracts will be indexed and available at major academic databases. The accepted papers will also be considered for publication in the special issues of the journal Engineering Letters, in IAENG journals and in edited books.




Calls for Manuscript Submissions


Proposals for special conference sessions and tutorials deadline: 30 December, 2009
Draft Paper Submission Deadline: 6 March, 2010
Camera-Ready Papers Due & Registration Deadline: 31 March, 2010
ICCIIS 2010: 30 June - 2 July, 2010







The topics of the ICISIE'10 include, but not limited to, the following:




Information Security:

Modeling and Analysis of Information Security
Protocols
Logical Analysis
Performance Analysis
Risk Analysis

Threat and Attacks in Information Security
Passive Attacks
Active Attacks
Trojan Horses
Viruses
Worms
Denial of Service

Services of Information Security
Authentication
Access Control
Secret Sharing
Database Security
Operating Systems Security
Confidentiality

Infrastructure for Information Security
Information Security Standards
Public Key Infrastructure
Certification Authority
Tools for Information Security


Cryptography
Cryptography algorithms
Hardware Design and Implementation
Simulation
Performance Analysis

Internet architecture design
Internet search methods
Optimization methods
Security and protection
Fault Tolerance

Software Agents
Web Java-based applications
Knowledge-based web systems
Multimedia web tools, architectures, and broadcasting
Web data mining and database management

Coding and compression

Information retrieval

Distance learning

E-commerce applications

E-business modeling and applications

And other Internet applications and other web services applications

Last modified: 2010-06-04 19:32:22