Inscrypt 2010 - The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
Date2010-10-20
Deadline2010-07-07
VenueShanghai, China
KeywordsInformation Security
Websitehttp://www.inscrypt.cn/
Topics/Call fo Papers
Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to http://www.easychair.org/conferences/?conf=inscryp...
TOPICS of interest include, but are not limited to, the following:
Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Database Security
Electronic Commerce Security
Intrusion Detection
Information Hiding and Watermarking
Key Management and Key Recovery
Network Security
Security Protocols and Their Analysis
Security Modeling and Architectures
Provable Security
Secure Multiparty Computation
Foundations of Cryptography
Secret Key and Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
Important Dates
Deadline for Submission
June 30, 2010
Paper Notification
August 30, 2010
Camera version deadline
September 15, 2010
Post-proceeding Version
Nov. 23, 2010
TOPICS of interest include, but are not limited to, the following:
Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Database Security
Electronic Commerce Security
Intrusion Detection
Information Hiding and Watermarking
Key Management and Key Recovery
Network Security
Security Protocols and Their Analysis
Security Modeling and Architectures
Provable Security
Secure Multiparty Computation
Foundations of Cryptography
Secret Key and Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
Important Dates
Deadline for Submission
June 30, 2010
Paper Notification
August 30, 2010
Camera version deadline
September 15, 2010
Post-proceeding Version
Nov. 23, 2010
Other CFPs
- 2011 3rd International Conference on Bioinformatics and Biomedical Technology (ICBBT 2011)
- 2011 International Conference on Mechanical and Aerospace Engineering (CMAE 2011)
- 2011 International Conference on Control, Robotics and Cybernetics (ICCRC 2011)
- The 2010 International Conference on Multimedia, Computer Graphics and Broadcasting (MulGraB 2010)
- 2011 IEEE Vehicular Technology Conference (VTC Fall)
Last modified: 2010-06-30 10:07:49