SAM 2014 - The 2014 International Conference on Security and Management (SAM'14)
Topics/Call fo Papers
SAM'14 conference proceedings (in printed book form; later, the proceedings will also be accessible online). Papers should demonstrate significant contribution to the construction, evaluation, application, or operation of secure systems. Those interested in proposing workshops/sessions, should refer to the "Call for Sessions/Workshops" section.
Topics of interest include, but are not limited to, the following:
Network Security
Security Algorithms
Mobile Network Security
Security in CDN (Contents Distribution Networks)
Virtual Private Network (VPN)
Tracing Techniques in Internet
Active Networks
Security in Grid
Web Monitoring
Network Security Engineering
Transport-Level Security
Wireless Network Security
IP Security
Electronic Mail security
Cryptographic Technologies
Security Protocols
Key Management Techniques
Cryptographic Technologies
Applications of Block and Stream Ciphers
Applications of Public Key Cryptology
Message Authentication and Hash Functions
Anonymity
Digital Signature Schemes
Secret Sharing
Cryptanalysis
Security Management
Surveillance Technologies
Security Policies
Security for Protocol Management
Location Management
QoS Management
Resource Management
Channel Management
Mobility Management
Digital Contents Copyright Protection
System Security Management
Network Security Management
Management in Network Equipment
Storage Area Networks (SAN) Management
Information Security Management
Government Security Policy
Web Penetration Testing
Security Operations
Vulnerabilities Management
Security Applications
Security in E-Commerce and M-Commerce
Secure OS
Watermarking
High-Tech Systems at Airports
Emerging Technologies and Applications
Cloud Computing Security
Database Security
Data Mining Security
Cyber Security Automation
Biometrics and Forensics
Novel Biometric Methods
Forensics
Biological Security Technologies
Face Recognition Systems
Signature Recognition Systems
Cyber Forensics
Forensic Analysis
Biometric Technologies for Security
Feature Extraction and Matching Algorithms
Hardware Security
Embedded Systems Security
Cryptographic Processors and Co-Processors
Security Architectures
True and Pseudorandom Number Generators
Side Channel Attacks
Fault Attacks
Hardware Tamper Resistance
Smart Card Processors
Secure Storage Devices
Information Assurance
Mission Assurance
Risk Assessment and Risk Management
Continuity of Operations and Business Impact Analysis
Cyber Security Compliance
Security Auditing
Security-Savvy Software Development
Disaster Recovery
Business Continuity Analysis
Access Control
Secure Use of Software
Secure Performance
Computer Security
Firewall Systems
Hacking Techniques and Related Issues
Intrusion Detection System (IDS)
Honeypot
Virus Issues (Detection, Prevention ...)
Trusted Computing
Alert Correlation
Attack Graphs
Incident Responding
Malware Analysis
Incident Responding
Malware Analysis
Intrusion Detection
Security Education
Computer Security Education
Network Security Education
Cyber Security Education
Cyber Security Body of Knowledge
Information Assurance Education
Topics of interest include, but are not limited to, the following:
Network Security
Security Algorithms
Mobile Network Security
Security in CDN (Contents Distribution Networks)
Virtual Private Network (VPN)
Tracing Techniques in Internet
Active Networks
Security in Grid
Web Monitoring
Network Security Engineering
Transport-Level Security
Wireless Network Security
IP Security
Electronic Mail security
Cryptographic Technologies
Security Protocols
Key Management Techniques
Cryptographic Technologies
Applications of Block and Stream Ciphers
Applications of Public Key Cryptology
Message Authentication and Hash Functions
Anonymity
Digital Signature Schemes
Secret Sharing
Cryptanalysis
Security Management
Surveillance Technologies
Security Policies
Security for Protocol Management
Location Management
QoS Management
Resource Management
Channel Management
Mobility Management
Digital Contents Copyright Protection
System Security Management
Network Security Management
Management in Network Equipment
Storage Area Networks (SAN) Management
Information Security Management
Government Security Policy
Web Penetration Testing
Security Operations
Vulnerabilities Management
Security Applications
Security in E-Commerce and M-Commerce
Secure OS
Watermarking
High-Tech Systems at Airports
Emerging Technologies and Applications
Cloud Computing Security
Database Security
Data Mining Security
Cyber Security Automation
Biometrics and Forensics
Novel Biometric Methods
Forensics
Biological Security Technologies
Face Recognition Systems
Signature Recognition Systems
Cyber Forensics
Forensic Analysis
Biometric Technologies for Security
Feature Extraction and Matching Algorithms
Hardware Security
Embedded Systems Security
Cryptographic Processors and Co-Processors
Security Architectures
True and Pseudorandom Number Generators
Side Channel Attacks
Fault Attacks
Hardware Tamper Resistance
Smart Card Processors
Secure Storage Devices
Information Assurance
Mission Assurance
Risk Assessment and Risk Management
Continuity of Operations and Business Impact Analysis
Cyber Security Compliance
Security Auditing
Security-Savvy Software Development
Disaster Recovery
Business Continuity Analysis
Access Control
Secure Use of Software
Secure Performance
Computer Security
Firewall Systems
Hacking Techniques and Related Issues
Intrusion Detection System (IDS)
Honeypot
Virus Issues (Detection, Prevention ...)
Trusted Computing
Alert Correlation
Attack Graphs
Incident Responding
Malware Analysis
Incident Responding
Malware Analysis
Intrusion Detection
Security Education
Computer Security Education
Network Security Education
Cyber Security Education
Cyber Security Body of Knowledge
Information Assurance Education
Other CFPs
- The 2014 International Conference on Modeling, Simulation and Visualization Methods (MSV'14)
- The 2014 International Conference on Information and Knowledge Engineering (IKE'14)
- The 2014 International Conference on Internet Computing and Big Data (ICOMP'14)
- The 2014 International Conference on Genetic and Evolutionary Methods (GEM'14)
- The 2014 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'14)
Last modified: 2014-02-06 07:45:10