ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICCS 2015 - Global Premier International Conference on Cryptography and Security 2015

Date2015-11-26 - 2015-11-27

Deadline2015-07-30

VenueKuala Lumpur, Malaysia Malaysia

KeywordsCryptography; Data Security; Network Security

Websitehttp://iccs.asdf.res.in

Topics/Call fo Papers

Access Contro, Applied Cryptography, Biometrics Security and Privacy, Critical Infrastructure Protection, Data Integrity, Data Protection, Database Security and Privacy, Digital Forensics, Digital Rights Management, Ethical and Legal Implications of Security and Privacy, Formal Methods for Security, Human Factors and Human Behavior Recognition Techniques, Identification, Authentication and Non-repudiation, Identity Management, Information Hiding, Information Systems Auditing, Insider Threats and Countermeasures, Intellectual Property Protection, Intrusion Detection & Prevention, Management of Computing Security, Network Security, Organizational Security Policies, Peer-to-Peer Security, Personal Data Protection for Information Systems,
Privacy,Privacy Enhancing Technologies, Reliability and Dependability, Risk Assessment,Security and Privacy in Complex Systems, Security and Privacy in Crowdsourcing, Security and Privacy in IT Outsourcing, Security and Privacy in Location-based Services, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Smart Grids, Security and Privacy in Social Networks, Security and Privacy in the Cloud, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security in Distributed Systems, Security Information Systems Architecture, Security Management, Security Metrics and Measurement, Security Protocols, Security requirements, Security Verification and Validation, Sensor and Mobile Ad Hoc Network Security, Service and Systems Design and QoS Network Security, Software Security,
Trust management and Reputation Systems, Ubiquitous Computing Security, Wireless Network Security.

Last modified: 2015-02-21 15:16:47