ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CSC 2014 - 2014年通信安全大会(CSC2014)

Date2014-05-22 - 2014-05-24

Deadline2014-03-31

Venue北京, China China

Keywords

Websitehttp://www.chinacommunications.cn/CN/new...

Topics/Call fo Papers

“2014通信安全大会”将于2014年5月22日在北京召?,会?以???告、学??座、?文交流与研??主要形式,就通信信息安全?域及其相??域?展前沿?点、最新研究?展、面?的挑???和?展??,?行深入、广泛、自由的学?交流。
  征文范?(不限于以下?域):
  Access Control and Trust Management ??控制和信任管理
  Attack Containment 攻?控制
  Attack Recovery 攻?恢?
  Cryptanalysis 密?分析学
  Digital Signatures 数字版?管理
  Distributed Intrusion Detection/Prevention Systems分布式入侵??/入侵防御
  Denial-of-Service Attacks and Countermeasures 拒?服?攻?和防?
  Identity Management and Authentication 身份管理和??
  Information Hiding 信息?藏
  Internet and Network Forensics 网?取?
  Quantum security communication 网?安全
  Risk Assessment ???估
  Secure Design and Testing 安全??和??
  Security for Wireless Network 无?安全
  Security in Web Services and Clouds云和互?网安全
  Security for Internet of Things 物?网安全
  Security in Pervasive and Embedded Systems 系?安全
  Secret Sharing 安全秘密共享
  Security Theory and Tools 安全理?与工具
  Spam Detection and Prevention 垃圾?件??防?
  Software and System Security ?件和系?安全
  Viruses, Worms, and Other Malicious Code 病毒,蠕虫和代?安全
  Vulnerability Scan 漏洞?描
  Secure communication protocol 安全通信??
  
  重要日期:
  全文截稿日期:2014-03-31
  ?文?用通知日期:2014-4-30
  征文要求:
  2014通信安全大会?迎来自学?、政府和行?各界的?秀?文,?文?未公??表且未向学?刊物和其它学?会?投稿的最新研究成果,文稿需要英文?写。?篇?用?文至少有一位作者需要到会???,并分享?告。
CSC is an annual international conference covering research in theories and applications of Information Security. CSC aims to attract high-quality papers in all technical aspects of Information Security. CSC will be first initiated in Beijing, China on May 22, 2014. The topics of interest of CSC include, but are not limited to, the following:
Access Control and Trust Management
Attack Containment
Attack Recovery
Cryptanalysis
Digital Signatures
Distributed Intrusion Detection/Prevention Systems
Denial-of-Service Attacks and Countermeasures
Identity Management and Authentication
Information Hiding
Internet and Network Forensics
Quantum Security Communication
Risk Assessment
Secure communication protocol
Secure Design and Testing
Security for Wireless Network
Security in Web Services and Clouds
Security in Pervasive and Embedded Systems
Security Internet of Things
Secret Sharing
Security Theory and Tools
Spam Detection and Prevention
Software and System Security
Viruses, Worms, and other Malicious Codes
Vulnerability Scan
Secure communication protocol
All papers presented at the conference will be considered by the IET for publication. Those that are accepted will be published on the IET Digital Library, indexed by IET Inspec and submitted to EI Compendex for consideration for indexing.
Important Dates:
Submission Deadline: March 31, 2014
Notification of Acceptance: April 30, 2014
Instruction for Authors:
CSC2014 welcomes original papers from academia, government, and industry. At least one author of each accepted paper is required to register with the conference and present the paper. All submissions should be submitted as required for double-blind review. Each paper should begin with a title, a short abstract, and a list of keywords. Each paper should be in PDF format and within 8 pages. For more information, please visit the conference website.
Submission e-mail: ICCS2013-AT-chinacommunications.cn

Last modified: 2014-04-30 23:16:14