CISSS 2014 - Communications and Information Systems Security Symposium
Date2014-06-10 - 2014-06-14
Deadline2013-09-15
VenueSydney, Australia
Keywords
Websitehttps://www.ieee-icc.org
Topics/Call fo Papers
To ensure complete coverage of the advances in communication and information systems security, the topics of interest of the CISS include, but are not limited to, the following areas:
? Anonymity, anonymous communication, metrics and their performance analysis
? Authentication protocols and message authentication
? Authorization and access control
? Availability and survivability of secure services and systems
? Big Data security and privacy
? Biometric security
? Botnet detection, prevention, and defense
? Cloud and distributed application security
? Computer and network forensics
? Cryptography and evaluation
? Data center security
? Firewall technologies; intrusion detection, localization, and avoidance
? Formal trust models, security modeling and protocol design
? Key distribution and management
? Lightweight security
? Location-based services and their security and privacy aspects
? Mobile and Wireless network security
? Mobile App security and privacy
? Multi-mode surveillance and homeland security
? Network public opinion analysis and monitoring
? Network security metrics and their performance evaluation
? Operating systems and application security and analysis tools
? Online Social Networks and their security aspects
? Physical security and hardware/software security
? Privacy and privacy enhancing technologies
? Quantum cryptography and communication applications
? Resource allocation, incentives, and game-theoretic approaches
? Security in virtual machine environments
? Security in wired systems and optical networks
? Security of Cyber-physical systems
? Security risk management
? Trust models, management and certificate handling
? Virtual private networks and group security
? Vulnerability, exploitation tools and virus analysis
? Web, e-commerce, and m-commerce security
? Anonymity, anonymous communication, metrics and their performance analysis
? Authentication protocols and message authentication
? Authorization and access control
? Availability and survivability of secure services and systems
? Big Data security and privacy
? Biometric security
? Botnet detection, prevention, and defense
? Cloud and distributed application security
? Computer and network forensics
? Cryptography and evaluation
? Data center security
? Firewall technologies; intrusion detection, localization, and avoidance
? Formal trust models, security modeling and protocol design
? Key distribution and management
? Lightweight security
? Location-based services and their security and privacy aspects
? Mobile and Wireless network security
? Mobile App security and privacy
? Multi-mode surveillance and homeland security
? Network public opinion analysis and monitoring
? Network security metrics and their performance evaluation
? Operating systems and application security and analysis tools
? Online Social Networks and their security aspects
? Physical security and hardware/software security
? Privacy and privacy enhancing technologies
? Quantum cryptography and communication applications
? Resource allocation, incentives, and game-theoretic approaches
? Security in virtual machine environments
? Security in wired systems and optical networks
? Security of Cyber-physical systems
? Security risk management
? Trust models, management and certificate handling
? Virtual private networks and group security
? Vulnerability, exploitation tools and virus analysis
? Web, e-commerce, and m-commerce security
Other CFPs
Last modified: 2013-07-21 10:01:23