ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

INSCRYPT 2013 - The 9th China International Conference on Information Security and Cryptology

Date2013-11-27 - 2013-11-30

Deadline2013-08-22

VenueGuangzhou, China China

Keywords

Websitehttps://www.inscrypt.cn/2013/Inscrypt_2013.html

Topics/Call fo Papers

The 9th China International Conference on Information Security and Cryptology (Inscrypt'2013)
Nov 27 - Nov 30, 2013, Guangzhou
Call For Papers
The 9th China International Conference on Information Security and Cryptology (INSCRYPT 2013) will be held in Guangzhou from November 27 to November 30, 2013. Inscrypt 2013 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of information security, cryptology, nd their applications. The conference proceedings will be published by Springer-Verlag in LNCS series.
AUTHOR INSTRUCTIONS: Technical papers describing original research contributions are solicited. Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings. All submissions must be written in English, and must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Such a submission should begin with a title, a short abstract, a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices, and must be submitted electronically to http://www.easychair.org/conferences/?conf=inscryp...
TOPICS of interest include, but are not limited to, the following:
Access Control
Authentication and Authorization
Biometric security
Block cipher modes of operation
Cloud computing security
Database security
Digital asset security and protection
Electronic Commerce Security
Foundations of Cryptography
Hash functions and MACs
Information Hiding and Watermarking
Intrusion Detection
Key Management and Key Recovery
Mobile network Security
Network Security
Operating system security
Privacy protection
Risk evaluation and security modeling
Secret Key and Public Key Cryptography
Security issues in Internet of Things
Security and Cryptographic Protocols
Software security and protection
System security

Last modified: 2013-03-22 23:18:40