ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SAM 2013 - The 2013 International Conference on Security and Management (SAM'13)

Date2013-07-22 - 2013-07-25

Deadline2013-03-18

VenueLas Vegas, USA - United States USA - United States

Keywords

Websitehttps://www.world-academy-of-science.org

Topics/Call fo Papers

Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems. Those interested in proposing workshops/sessions, should refer to the "Sessions/Workshop Proposals" section.
Topics of interest include, but are not limited to, the following:
Network Security
Security Algorithms
Mobile Network Security
Security in CDN (Contents Distribution Networks)
Virtual Private Network (VPN)
Tracing Techniques in Internet
Active Networks
Security in Grid
Web Monitoring
Network Security Engineering
Transport-Level Security
Wireless Network Security
IP Security
Electronic Mail security
Cryptographic Technologies
Security Protocols
Key Management Techniques
Cryptographic Technologies
Applications of Block and Stream Ciphers
Applications of Public Key Cryptology
Message Authentication and Hash Functions
Anonymity
Digital Signature Schemes
Secret Sharing
Cryptanalysis
Security Management
Surveillance Technologies
Security Policies
Security for Protocol Management
Location Management
QoS Management
Resource Management
Channel Management
Mobility Management
Digital Contents Copyright Protection
System Security Management
Network Security Management
Management in Network Equipment
Storage Area Networks (SAN) Management
Information Security Management
Government Security Policy
Web Penetration Testing
Security Operations
Vulnerabilities Management
Security Applications
Security in E-Commerce and M-Commerce
Secure OS
Watermarking
High-Tech Systems at Airports
Emerging Technologies and Applications
Cloud Computing Security
Database Security
Data Mining Security
Cyber Security Automation
Biometrics and Forensics
Novel Biometric Methods
Forensics
Biological Security Technologies
Face Recognition Systems
Signature Recognition Systems
Cyber Forensics
Forensic Analysis
Biometric Technologies for Security
Feature Extraction and Matching Algorithms
Hardware Security
Embedded Systems Security
Cryptographic Processors and Co-Processors
Security Architectures
True and Pseudorandom Number Generators
Side Channel Attacks
Fault Attacks
Hardware Tamper Resistance
Smart Card Processors
Secure Storage Devices
Information Assurance
Mission Assurance
Risk Assessment and Risk Management
Continuity of Operations and Business Impact Analysis
Cyber Security Compliance
Security Auditing
Security-Savvy Software Development
Disaster Recovery
Business Continuity Analysis
Access Control
Secure Use of Software
Secure Performance
Computer Security
Firewall Systems
Hacking Techniques and Related Issues
Intrusion Detection System (IDS)
Honeypot
Virus Issues (Detection, Prevention ...)
Trusted Computing
Alert Correlation
Attack Graphs
Incident Responding
Malware Analysis
Incident Responding
Malware Analysis
Intrusion Detection
Security Education
Computer Security Education
Network Security Education
Cyber Security Education
Cyber Security Body of Knowledge
Information Assurance Education

Last modified: 2013-01-03 11:54:48