C-IHS 2014 - 4th International Workshop on Chaos-Information Hiding and Security, (CIHS-2014)
Topics/Call fo Papers
The purpose of the 4th workshop CIHS-2014 “Chaos-Information Hiding and Security” is to bring together researchers, practitioners and industrials interested on security aspects related to information and communication. Theoretical and practical advances in the fields of Information Security are a key factor in the growth of data communications, data networks and distributed computing. In addition, CIHS also focuses on applications in the scope of systems development in particular, in the context of e-business, internet and global enterprises.
Information security is a very important topic nowadays, including statistics and stochastic processes, Pseudo random and chaotic sequences, iteration theory, coding, estimation, Shannon theory, crypto-compression, chaos-based crypto and crypto-compression systems, data compression, data networks, systems security, cryptography, steganography, watermarking, as well as many other topics that can be listed, as indicated below. Papers describing new methods and technologies, advanced prototypes, tools, and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below.
Information security is a very important topic nowadays, including statistics and stochastic processes, Pseudo random and chaotic sequences, iteration theory, coding, estimation, Shannon theory, crypto-compression, chaos-based crypto and crypto-compression systems, data compression, data networks, systems security, cryptography, steganography, watermarking, as well as many other topics that can be listed, as indicated below. Papers describing new methods and technologies, advanced prototypes, tools, and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below.
Other CFPs
- 13th Workshop on E-Learning Security (ELS-2014)
- 6th International Workshop on RFID Security and Cryptography 2014 (RISC’14)
- International Workshop on Ubiquitous Computing Security Issues (UCSI'14)
- 2nd International workshop on Big Data and Social Networking Management and Security (BDSN-2014)
- The 5th International Workshop on Cloud Applications and Security
Last modified: 2014-06-18 00:26:47