CSS 2014 - 3rd International Conference on Cryptography and Security Systems
Topics/Call fo Papers
In recent years, computer applications and Internet services have been contributing extensively to our life experience and, simultaneously, they are vulnerable and undergo permanent attacks. The objective of the Cryptography and Security System Conference is to present research and developing activities original unpublished results related to all aspects of cryptography and network security. We invite both theoretical, applied research papers, case studies, implementation experiences as well as work-in-progress presentations.
The Full Papers accepted after peer review will be published in Springer: Communications in Computer and Information Sciences.
The short and work in progess papers accepted after peer review will be published in Special Issue of Journal - Annales UMCS ser. Informatica.
Topics
The main topics of interest include, but are not limited to:
network security
cryptography and data protection
peer-to-peer security
wireless networks security
security of sensor networks
heterogeneous networks security
privacy-enhancing methods
covert channels
steganography and watermarking for security applications
security of webservices
cryptographic protocols
security as quality of service, quality of protection
data and application security, software security
security models, evaluation, and verification
formal methods in security
trust and reputation models
reputation systems for security applications
intrusion tolerance
system surveillance and enhanced security
cybercrime: threats and countermeasures
Legal constraints of security systems
Risk analysis and management
The Full Papers accepted after peer review will be published in Springer: Communications in Computer and Information Sciences.
The short and work in progess papers accepted after peer review will be published in Special Issue of Journal - Annales UMCS ser. Informatica.
Topics
The main topics of interest include, but are not limited to:
network security
cryptography and data protection
peer-to-peer security
wireless networks security
security of sensor networks
heterogeneous networks security
privacy-enhancing methods
covert channels
steganography and watermarking for security applications
security of webservices
cryptographic protocols
security as quality of service, quality of protection
data and application security, software security
security models, evaluation, and verification
formal methods in security
trust and reputation models
reputation systems for security applications
intrusion tolerance
system surveillance and enhanced security
cybercrime: threats and countermeasures
Legal constraints of security systems
Risk analysis and management
Other CFPs
- 2014 IEEE Canadian Conference on Electrical and Computer Engineering
- International Workshop on Social technologies for health and wellbeing
- Fifth International Workshop on Smart Healthcare and Wellness Applications (SmartHealth’13)
- International Workshop on Interacting with Emerging Technologies and Big Data in Collaborative Environments
- The 1st Workshop on Network Services and Applications: Big Data and e-Health (BDeHS)
Last modified: 2013-10-06 13:24:21