IJISS 2013 - International Journal of Information Security Science
Date2013-12-31 - 2014-01-14
Deadline2013-12-30
VenueOnline, Online
Keywordsinformation security; cryptology; digital forensics
Websitehttps://www.ijiss.org
Topics/Call fo Papers
? Securing Networks, Computers, Services, Systems, Databases
? Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology
? Information Security Science (ISS) and Engineering
? Cryptographic Hardware
? Coding Theory
? Applications of Boolean Functions,Finite Fields and Elliptic Curves to Cryptography
? Artificial Intelligence Techniques for ISS and Engineering
? Smart Card, RFID, NFC, 3G, 4G, etc. Security
? Security Risk Analysis, Modelling, Evaluation and Management
? Secure Coding, Source Code Auditing and Review
? Critical Information and Infrastructure Security
? Security Standards, Protocols and Policies
? Mobile Communication and Application Security
? e-Governance and e-Government Security
? Cryptanalysis (Block Ciphers, Hash Functions, etc.)
? Post-Quantum Cryptography ? Steganography and Steganalysis
? Operating System Security
? Cloud Computing and Virtual Machine Security
? Public Key Infrastructures
? Wireless, Ad Hoc and Sensor Network Security
? Web and Web Application Security
? Penetration Tests, Tools and Techniques
? Social Engineering Attacks and Prevention
? Intrusion Detection and Prevention Systems
? Content Protection
? Malicious Software Threats and Protection
? Ethical Hacking
? Biometrics
? Cyber Security, Warefare, Defense and Policies
? M2M Security
? Public Key Cryptography
? Symmetric Key Cryptography
? Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology
? Information Security Science (ISS) and Engineering
? Cryptographic Hardware
? Coding Theory
? Applications of Boolean Functions,Finite Fields and Elliptic Curves to Cryptography
? Artificial Intelligence Techniques for ISS and Engineering
? Smart Card, RFID, NFC, 3G, 4G, etc. Security
? Security Risk Analysis, Modelling, Evaluation and Management
? Secure Coding, Source Code Auditing and Review
? Critical Information and Infrastructure Security
? Security Standards, Protocols and Policies
? Mobile Communication and Application Security
? e-Governance and e-Government Security
? Cryptanalysis (Block Ciphers, Hash Functions, etc.)
? Post-Quantum Cryptography ? Steganography and Steganalysis
? Operating System Security
? Cloud Computing and Virtual Machine Security
? Public Key Infrastructures
? Wireless, Ad Hoc and Sensor Network Security
? Web and Web Application Security
? Penetration Tests, Tools and Techniques
? Social Engineering Attacks and Prevention
? Intrusion Detection and Prevention Systems
? Content Protection
? Malicious Software Threats and Protection
? Ethical Hacking
? Biometrics
? Cyber Security, Warefare, Defense and Policies
? M2M Security
? Public Key Cryptography
? Symmetric Key Cryptography
Other CFPs
- 2013 The 2nd International Conference on Convergence and its Application
- 2nd International Conference on Business Innovation and Management-ICBIM-2014
- 2nd International Conference on Business & Information Management
- The Second International conference on Parallel, Distributed Computing and Applications (IPDCA-2013)
- Second International Conference on Digital Image Processing and Vision
Last modified: 2013-08-28 02:46:47