MULTICONF-10 2010 - International Conference on Information Security and Privacy (ISP-10)
Topics/Call fo Papers
The scope of the conference includes all areas of information security, privacy, cryptography and all related areas. Sample topics include but WILL NOT be limited to:
Access Control
Accounting and Audit
Agent and Mobile Code Security
Anonymity and Pseudonymity
Antitamper and TEMPEST
Applied Cryptography
Attacks and Prevention of Online Fraud
Authentication, Authorization and Access Control
Authentication and Nonrepudiation
Biometrics
Block/Stream Ciphers
Cell phone, PDA and Potable Device Security
Computer Forensics
Copyright Protection
Cryptanalysis
Cryptographic Protocols and Functions
Cyberattack and Cyberterrorism
Data Integrity and Privacy
Database and System Security
Design and Analysis of Cryptographic Algorithms
Digital Rights Management
Digital Signatures
Distributed System Security
Ebomb and Electronic Attack
ECommerce and EGovernment Security
Economics of Security and Privacy
Efficient Implementations
Electronic Commerce
Elliptic Curve Cryptosystems
Firewall, IDS, Antivirus and other Security Products
Formal Methods in Security
Foundations of Computer Security
Hash Functions
Identity and Trust Management
Information Hiding and Watermarking
Information Warfare and Countermeasures
Infrastructure Security
Intellectual Property Protection
Internet and Web Services Security
Intranet Security
Intrusion Detection, Tolerance and Prevention
Key Management and Recovery
Key/Identity Management
Malicious Codes
Mobile and Ad hoc network security
Mobile, Ad Hoc and Sensor and Wireless Network Security
New Theory and Paradigms for Security
Operating System Security
Peer-to-Peer Network Security
Personnel Security and Privacy
Physical Security and Soldier Security
PKI and PMI
Private Searches
Public Key Cryptosystems
Public Key Infrastructure
RFID, Sensor Network, Ubiquitous Computing Security
Secret Sharing
Secure Hardware and Software Design
Security and Privacy in Pervasive/Ubiquitous Computing
Security Education and Training
Security Engineering and Its Application
Security Evaluation Criteria and Methodology
Security for Mobile Code
Security in Development Processes
Security in Information Flow
Security in System/Software/Product Development Site
Security Level Definition Criteria and Its Application
Security Management
Security Maturity Model
Security Modeling and Architectures
Security Models for Ambient Intelligence environments
Security of eCommerce, eBusiness and eGovernment
Security of Grid Computing
Security Policy, Strategy and Management
Security Requirements Engineering
Sensortoshooter/Command Control System Security
Smart/Java Cards
Smartcards and Chip Security
Special Session on Hashing
Tactical Communication and Network Security
Trust Negotiation, Establishment and Management
Trusted Computing
Usable Security
Vulnerability, Threat, and Risk Analysis
Zero Knowledge
Access Control
Accounting and Audit
Agent and Mobile Code Security
Anonymity and Pseudonymity
Antitamper and TEMPEST
Applied Cryptography
Attacks and Prevention of Online Fraud
Authentication, Authorization and Access Control
Authentication and Nonrepudiation
Biometrics
Block/Stream Ciphers
Cell phone, PDA and Potable Device Security
Computer Forensics
Copyright Protection
Cryptanalysis
Cryptographic Protocols and Functions
Cyberattack and Cyberterrorism
Data Integrity and Privacy
Database and System Security
Design and Analysis of Cryptographic Algorithms
Digital Rights Management
Digital Signatures
Distributed System Security
Ebomb and Electronic Attack
ECommerce and EGovernment Security
Economics of Security and Privacy
Efficient Implementations
Electronic Commerce
Elliptic Curve Cryptosystems
Firewall, IDS, Antivirus and other Security Products
Formal Methods in Security
Foundations of Computer Security
Hash Functions
Identity and Trust Management
Information Hiding and Watermarking
Information Warfare and Countermeasures
Infrastructure Security
Intellectual Property Protection
Internet and Web Services Security
Intranet Security
Intrusion Detection, Tolerance and Prevention
Key Management and Recovery
Key/Identity Management
Malicious Codes
Mobile and Ad hoc network security
Mobile, Ad Hoc and Sensor and Wireless Network Security
New Theory and Paradigms for Security
Operating System Security
Peer-to-Peer Network Security
Personnel Security and Privacy
Physical Security and Soldier Security
PKI and PMI
Private Searches
Public Key Cryptosystems
Public Key Infrastructure
RFID, Sensor Network, Ubiquitous Computing Security
Secret Sharing
Secure Hardware and Software Design
Security and Privacy in Pervasive/Ubiquitous Computing
Security Education and Training
Security Engineering and Its Application
Security Evaluation Criteria and Methodology
Security for Mobile Code
Security in Development Processes
Security in Information Flow
Security in System/Software/Product Development Site
Security Level Definition Criteria and Its Application
Security Management
Security Maturity Model
Security Modeling and Architectures
Security Models for Ambient Intelligence environments
Security of eCommerce, eBusiness and eGovernment
Security of Grid Computing
Security Policy, Strategy and Management
Security Requirements Engineering
Sensortoshooter/Command Control System Security
Smart/Java Cards
Smartcards and Chip Security
Special Session on Hashing
Tactical Communication and Network Security
Trust Negotiation, Establishment and Management
Trusted Computing
Usable Security
Vulnerability, Threat, and Risk Analysis
Zero Knowledge
Other CFPs
- International Conference on High Performance Computing Systems (HPCS-10)
- International Conference on Enterprise Information Systems and Web Technologies (EISWT-10)
- International Conference on Computer Networks (CN-10)
- International Conference on Bioinformatics, Computational Biology, Genomics and Chemoinformatics (BCBGC-10)
- International Conference on Automation, Robotics and Control Systems (ARCS-10)
Last modified: 2010-06-04 19:32:22