ISTP 2013 - International Workshop on Information Security, Theory and Practice (ISTP-2013)
Date2013-12-09 - 2013-12-12
Deadline2013-06-30
VenueLondon, UK - United Kingdom
Keywords
Websitehttps://www.icitst.org
Topics/Call fo Papers
Topics include but are not limited to:
Applied Cryptography
Chaos Generation
Chaos Characterization
Chaos Synchronization
Chaos-based Data Security
Chaos-based Crypto and Crypto-Compression Systems
Chaos based Steganography
Chaos-based Watermarking
Chaos-based Crypto-Biometric Schemes
Crypto-Biometric Systems
Dynamical Systems
Data IntegrityDatabase Security and Privacy
E-business Security
Iteration Theory
Identification, Authentication and Non-repudiation
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Peer-to-Peer Security
Personal Data Protection for Information Systems
Sensor and Mobile Ad Hoc Network Security
Security and Privacy in Mobile Systems
Service and Systems Design and QoS Network Security
Security Information Systems Architecture and Design and Security Patterns
Security and Privacy in Location-based Services
Secure Cloud Computing
Security and Privacy in Complex Systems
Security and Privacy in Social Networks
Security and Privacy in Web Services
Security in Distributed Systems
Security Verification and Validation
Software Security
Steganography
Watermarking
Wireless Network Security (UMTS, WiFi, WiMAX, WiMedia and others)
Applied Cryptography
Chaos Generation
Chaos Characterization
Chaos Synchronization
Chaos-based Data Security
Chaos-based Crypto and Crypto-Compression Systems
Chaos based Steganography
Chaos-based Watermarking
Chaos-based Crypto-Biometric Schemes
Crypto-Biometric Systems
Dynamical Systems
Data IntegrityDatabase Security and Privacy
E-business Security
Iteration Theory
Identification, Authentication and Non-repudiation
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Peer-to-Peer Security
Personal Data Protection for Information Systems
Sensor and Mobile Ad Hoc Network Security
Security and Privacy in Mobile Systems
Service and Systems Design and QoS Network Security
Security Information Systems Architecture and Design and Security Patterns
Security and Privacy in Location-based Services
Secure Cloud Computing
Security and Privacy in Complex Systems
Security and Privacy in Social Networks
Security and Privacy in Web Services
Security in Distributed Systems
Security Verification and Validation
Software Security
Steganography
Watermarking
Wireless Network Security (UMTS, WiFi, WiMAX, WiMedia and others)
Other CFPs
- The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
- Shanghai International Conference on Social Science
- The Symposium on Engineering Test Harness 2013
- The International Workshop on Human Body Communications and Biomedical Signal Processing
- The International Workshop on Sensor Data Processing and Integration
Last modified: 2013-01-17 20:23:08