ICSST 2015 - ICSST 2015- the 4th International Conference on Security Science and Technology
Date2015-01-15 - 2015-01-16
Deadline2014-11-30
VenuePortsmouth, UK - United Kingdom
KeywordsSecurity; Control; Computer
Websitehttps://www.icsst.org
Topics/Call fo Papers
2015 the 4th International Conference on Security Science and Technology (ICSST 2015)
January 15-16, 2015
Portsmouth, UK
http://www.icsst.org/
Publications:
All accepted papers will be published in the volume of International Journal of Engineering and Technology (IJET) (ISSN; 1793-8244 (Online Version); 1793-8236 (Print Version)), and will be included in the Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library.
Topics for ICSST 2015:
Access control and secure audit
Analysis of security protocols
Anonymity services
Biometrics
Computer Forensics
Critical Infrastructures Protection
Design and Analysis of Cryptosystems
Smart Cards
Vulnerability and threat analysis
Web Services Modeling and Compositions
Watermarking
Secure operating systems
Security engineering
Data and Systems Integrity
Key Management and Key Recovery
For More Topics: http://www.icsst.org/cfp.html
How to Submit:
1. Electronic Submission System:
http://www.easychair.org/conferences/?conf=icsst20...
2. by emai: icsst-AT-asr.org
Contact us:
Ms. Cindy Miao
E-mail: icsst-AT-asr.org
ICSST 2015 website:http://www.icsst.org/
Tel: +1-617-229-6820 (USA)
+86-28-86527868 (operation center in China)
January 15-16, 2015
Portsmouth, UK
http://www.icsst.org/
Publications:
All accepted papers will be published in the volume of International Journal of Engineering and Technology (IJET) (ISSN; 1793-8244 (Online Version); 1793-8236 (Print Version)), and will be included in the Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library.
Topics for ICSST 2015:
Access control and secure audit
Analysis of security protocols
Anonymity services
Biometrics
Computer Forensics
Critical Infrastructures Protection
Design and Analysis of Cryptosystems
Smart Cards
Vulnerability and threat analysis
Web Services Modeling and Compositions
Watermarking
Secure operating systems
Security engineering
Data and Systems Integrity
Key Management and Key Recovery
For More Topics: http://www.icsst.org/cfp.html
How to Submit:
1. Electronic Submission System:
http://www.easychair.org/conferences/?conf=icsst20...
2. by emai: icsst-AT-asr.org
Contact us:
Ms. Cindy Miao
E-mail: icsst-AT-asr.org
ICSST 2015 website:http://www.icsst.org/
Tel: +1-617-229-6820 (USA)
+86-28-86527868 (operation center in China)
Other CFPs
- How To Develop and Execute a Payer Contracting Strategy and Business Rules
- ICNCS 2015- the 4th International Conference on Network and Computer Science
- ICK 2015- International Conference on Knowledge
- How to Deal with the Disruptive Practitioner - Webinar By MentorHealth
- Creating and Implementing Effective Security Policies - Webinar By MentorHealth
Last modified: 2014-11-05 16:49:40