WORLDCOMP 2010 - SAM'10 - The 2010 International Conference on Security and Management
Topics/Call fo Papers
Topics of interest include, but are not limited to, the following:
Security algorithms
Security in e-Commerce and m-Commerce
Surveillance technologies
Novel biometric methods
Security protocols
Firewall systems
Key management techniques
Mobile network security
Hacking techniques and related issues
Security policies
Secure OS
Security in CDN (Contents Distribution Networks)
Security for protocol management (SNMP, CMIP, etc)
Location management
QoS management
Resource management
Channel management
Mobility management
Encryption technologies
VPN
IDS (Intrusion Detection System)
Digital contents copyright protection techniques
Watermarking
Honeypot
Virus issues (detection, prevention, ...)
Tracing techniques in internet
Active networks
Security in grid
Biological security technologies
High-tech systems at airports
Face recognition systems
Signature recognition systems
System security management
Network security management
Management in network equipments
SAN (Storage Area Networks) management
Applications of block and stream ciphers
Applications of public key cryptology
Message authentication and hash functions
Grid computing and security
Cloud computing and security
Web monitoring
Trust computing
Emerging technologies and applications
Security algorithms
Security in e-Commerce and m-Commerce
Surveillance technologies
Novel biometric methods
Security protocols
Firewall systems
Key management techniques
Mobile network security
Hacking techniques and related issues
Security policies
Secure OS
Security in CDN (Contents Distribution Networks)
Security for protocol management (SNMP, CMIP, etc)
Location management
QoS management
Resource management
Channel management
Mobility management
Encryption technologies
VPN
IDS (Intrusion Detection System)
Digital contents copyright protection techniques
Watermarking
Honeypot
Virus issues (detection, prevention, ...)
Tracing techniques in internet
Active networks
Security in grid
Biological security technologies
High-tech systems at airports
Face recognition systems
Signature recognition systems
System security management
Network security management
Management in network equipments
SAN (Storage Area Networks) management
Applications of block and stream ciphers
Applications of public key cryptology
Message authentication and hash functions
Grid computing and security
Cloud computing and security
Web monitoring
Trust computing
Emerging technologies and applications
Other CFPs
- MSV'10 - The 2010 International Conference on Modeling, Simulation and Visualization Methods
- IKE'10 - The 2010 International Conference on Information and Knowledge Engineering
- ICOMP'10 - The 2010 International Conference on Internet Computing
- GEM'10 - The 2010 International Conference on Genetic and Evolutionary Methods
- FECS'10 - The 2010 International Conference on Frontiers in Education: Computer Science and Computer Engineering
Last modified: 2010-06-04 19:32:22