ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICINS 2015 - 2015 2nd International Conference on Information and Network Security (ICINS 2015)

Date2015-07-29 - 2015-07-30

Deadline2015-05-15

VenueShanghai, China China

KeywordsInformation; Network Security; Software

Websitehttps://www.icins.org

Topics/Call fo Papers

2015 2nd International Conference on Information and Network Security (ICINS 2015)
July 29-30, 2015
Shanghai, China
http://www.icins.org/
Publication:
All accepted papers will be selected and published in One of the following Journals.
-- WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517)
Indexed by EI Compendex, Scopus and ISI.
-- International Journal of Communications (JCM, 1796-2021)
Indexed by Scopus and EI Compendex
Topics:
Security of Web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Intrusion prevention, detection, and response
Security for electronic voting
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Network perimeter controls: firewalls, packet filters, and application gateways
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Security for Vehicular Ad-hoc Networks (VANETs)
Security for peer-to-peer and overlay network systems
Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
Implementation, deployment and management of network security policies
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Integrating security services with system and application security facilities and protocols
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
Security for large-scale systems and critical infrastructures
Integrating security in Internet protocols: routing, naming, network management
For more topics: http://www.icins.org/cfp.html
Submission method:
Electronic Submission System; ( .pdf)
http://www.easychair.org/conferences/?conf=icins20...
Contact us:
Ms. Yashin Tu
E-mail: icins-AT-iacsit.org
Tel: +1-518-478-2659
+86-28-86528758

Last modified: 2015-03-03 17:56:14