ICCS 2015 - Global Premier International Conference on Cryptography and Security 2015
Date2015-11-26 - 2015-11-27
Deadline2015-07-30
VenueKuala Lumpur, Malaysia
KeywordsCryptography; Data Security; Network Security
Websitehttps://iccs.asdf.res.in
Topics/Call fo Papers
Access Contro, Applied Cryptography, Biometrics Security and Privacy, Critical Infrastructure Protection, Data Integrity, Data Protection, Database Security and Privacy, Digital Forensics, Digital Rights Management, Ethical and Legal Implications of Security and Privacy, Formal Methods for Security, Human Factors and Human Behavior Recognition Techniques, Identification, Authentication and Non-repudiation, Identity Management, Information Hiding, Information Systems Auditing, Insider Threats and Countermeasures, Intellectual Property Protection, Intrusion Detection & Prevention, Management of Computing Security, Network Security, Organizational Security Policies, Peer-to-Peer Security, Personal Data Protection for Information Systems,
Privacy,Privacy Enhancing Technologies, Reliability and Dependability, Risk Assessment,Security and Privacy in Complex Systems, Security and Privacy in Crowdsourcing, Security and Privacy in IT Outsourcing, Security and Privacy in Location-based Services, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Smart Grids, Security and Privacy in Social Networks, Security and Privacy in the Cloud, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security in Distributed Systems, Security Information Systems Architecture, Security Management, Security Metrics and Measurement, Security Protocols, Security requirements, Security Verification and Validation, Sensor and Mobile Ad Hoc Network Security, Service and Systems Design and QoS Network Security, Software Security,
Trust management and Reputation Systems, Ubiquitous Computing Security, Wireless Network Security.
Privacy,Privacy Enhancing Technologies, Reliability and Dependability, Risk Assessment,Security and Privacy in Complex Systems, Security and Privacy in Crowdsourcing, Security and Privacy in IT Outsourcing, Security and Privacy in Location-based Services, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Smart Grids, Security and Privacy in Social Networks, Security and Privacy in the Cloud, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security in Distributed Systems, Security Information Systems Architecture, Security Management, Security Metrics and Measurement, Security Protocols, Security requirements, Security Verification and Validation, Sensor and Mobile Ad Hoc Network Security, Service and Systems Design and QoS Network Security, Software Security,
Trust management and Reputation Systems, Ubiquitous Computing Security, Wireless Network Security.
Other CFPs
- 3rd International Workshop on PErsonalization in eGOVernment and Smart Cities: Smart Services for Smart Territories (PEGOV2015)
- 1st workshop on Deep Content Analytics Techniques for Personalized and Intelligent Services
- 5th International Workshop on Personalization Approaches in Learning Environments (PALE)
- International Workshop on Personalisation and Adaptation in Technology for Health
- Eighteenth Information Security Conference (ISC 2015)
Last modified: 2015-02-21 15:16:47