ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICMASM 2013 - The 2013 International Conference on Mobile Applications and Security Management

Date2013-06-22 - 2013-06-24

Deadline2013-04-05

VenueSousse, Tunisia Tunisia

Keywords

Website

Topics/Call fo Papers

Topics of interest include, but are not limited to, the following:
Access Control
Active Networks
Alert Correlation
Anonymity
Applications of Block and Stream Ciphers
Applications of Public Key Cryptology
Attack Graphs
Biological Security Technologies
Biometric Technologies for Security
Biometrics and Forensics
Business Continuity Analysis
Channel Management
Cloud Computing Security
Computer Security
Computer Security Education
Continuity of Operations and Business Impact Analysis
Cryptanalysis
Cryptographic Processors and Co-Processors
Cryptographic Technologies
Cryptographic Technologies
Cyber Forensics
Cyber Security Automation
Cyber Security Body of Knowledge
Cyber Security Compliance
Cyber Security Education
Data Mining Security
Database Security
Digital Contents Copyright Protection
Digital Signature Schemes
Disaster Recovery
Electronic Mail security
Embedded Systems Security
Emerging Technologies and Applications
Face Recognition Systems
Fault Attacks
Feature Extraction and Matching Algorithms
Firewall Systems
Forensic Analysis
Forensics
Government Security Policy
Hacking Techniques and Related Issues
Hardware Security
Hardware Tamper Resistance
High-Tech Systems at Airports
Honeypot
Incident Responding
Incident Responding
Information
Information Assurance
Information Security Management
Intrusion Detection
Intrusion Detection System (IDS)
IP Security
Key Management Techniques
Location Management
Malware Analysis
Malware Analysis
Management in Network Equipment
Message Authentication and Hash Functions
Mission Assurance
Mobile Network Security
Mobility Management
Network Security
Network Security Education
Network Security Engineering
Network Security Management
Novel Biometric Methods
QoS Management
Resource Management
Risk Assessment and Risk Management
Secret Sharing
Secure OS
Secure Performance
Secure Storage Devices
Secure Use of Software
Security Algorithms
Security Applications
Security Architectures
Security Auditing
Security Education
Security for Protocol Management
Security in CDN (Contents Distribution Networks)
Security in E-Commerce and M-Commerce
Security in Grid
Security Management
Security Operations
Security Policies
Security Protocols
Security-Savvy Software Development
Side Channel Attacks
Signature Recognition Systems
Smart Card Processors
Storage Area Networks (SAN) Management
Surveillance Technologies
System Security Management
Tracing Techniques in Internet
Transport-Level Security
True and Pseudorandom Number Generators
Trusted Computing
Virtual Private Network (VPN)
Virus Issues (Detection, Prevention ...)
Vulnerabilities Management
Watermarking
Web Monitoring
Web Penetration Testing
Wireless Network Security

Last modified: 2013-02-21 08:12:22