CIS 2015 - The 2nd Conference on Information Security (CIS 2015)
Topics/Call fo Papers
Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Biometric Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Electronic Commerce Security
Fraud Control
Grid Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Key Management and Key Recovery
Language-based Security
Network Security
Operating System Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
System Security
Trusted Computing and Trustworthy Computing Technology
Anti-Virus and Anti-Worms
Authentication and Authorization
Biometric Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Electronic Commerce Security
Fraud Control
Grid Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Key Management and Key Recovery
Language-based Security
Network Security
Operating System Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
System Security
Trusted Computing and Trustworthy Computing Technology
Other CFPs
- International workshop on Interactive Environments and Emerging Technologies for eLearning
- Second International Go Game Science Conference
- 2nd International Students' Scientific Conference 'The Sound Ambiguity'
- International Conference on Methods and Models in Automation and Robotics
- Special Issue on Compositional Models and Structured Learning for Visual Recognition
Last modified: 2014-12-25 11:49:45