ICCS 2014 - International Conference on Cryptography and Security
Date2014-07-18 - 2014-07-21
Deadline2014-04-30
VenueBangkok, Thailand
Keywords
Websitehttps://www.iccs.asdf.org.in
Topics/Call fo Papers
The purpose of ICCS 2014, the International Conference on Cryptography and Security, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication.
Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, ICCS also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics.
Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of ICCS 2014, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and virtual sessions.
The papers will be made to appear in a book to be published by ASDF HQ, India in EDLIB (www.edlib.asdf.res.in). All the published paper will be indexed by Google Scholar and various others search engines.
Conference Topics
Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and Privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security
Paper Submission
Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. Only original papers should be submitted. Authors are advised to follow ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.
Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.
Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, ICCS also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics.
Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of ICCS 2014, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and virtual sessions.
The papers will be made to appear in a book to be published by ASDF HQ, India in EDLIB (www.edlib.asdf.res.in). All the published paper will be indexed by Google Scholar and various others search engines.
Conference Topics
Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and Privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security
Paper Submission
Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. Only original papers should be submitted. Authors are advised to follow ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.
Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.
Other CFPs
- International Conference on Cyber Behavior
- 34th International Cryptology Conference
- 1ST INTERNATIONAL CONFERENCE APPLIED MODERN LANGUAGES Contemporary Dynamics of Languages and Cultures
- International Workshop on Logical Aspects of Multi-Agent Systems
- The First Workshop on Computational Social Choice: Beyond the Worst Case
Last modified: 2013-12-06 21:26:45