ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CIS 2016 - Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2016)

Date2016-09-21 - 2016-09-24

Deadline2016-04-30

VenueJaipur, India India

Keywords

Websitehttps://acn-conference.org/sscc2016/cis2016.html

Topics/Call fo Papers

With most services and products now being offered through digital communications, new challenges have emerged for cryptology specialists. A Multidisciplinary Perspectives in Cryptology presents a range of topics on the Cryptology methods and safety of information and communication technology. It brings together methods in applied mathematics, computer science, and engineering, telecommunication sciences, physics, chemistry, Digital Signal processing, Error Correcting Codes, information theory, electrical engineering, hardware realization aspects. The session aims to collect the papers oriented towards the introduction on multidisciplinary aspects and their importance in implementation of the new methods and algorithms designed for cryptography, cryptanalysis, and complexity evaluation of the designed algorithms. It improves the ability to process and manage information and knowledge-related processes in order to create new knowledge.
The workshop will aim to provide:
Comprehensive coverage along with the latest developments in cryptography
Presentation of many widely used cryptographic algorithms, cryptanalysis algorithms, and complexity evaluation methods that based mainly on multidisciplinary applications within these branches of Cryptology
The committee invites original and unpublished work from individuals active in the broad theme of the Workshop. The manuscripts should be submitted in PDF format. Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on. Further instructions for submission are posted at http://acn-conference.org/sscc2016/submission.html
Recommended topics include, but are not limited to, the following:
Code Based Cryptography
Fuzzy Logic Based Cryptology
Genetic Algorithm Based Cryptology
Neural Based Cryptology
Biometric Cryptography
Chaos Based Cryptology
Quantum Based Cryptology
Engineering and Cryptology
ICA and PCA based Cryptology
DSP based Cryptology
Multidisciplinary in Wireless Communication Security
Multidisciplinary in Information Hiding
Multidisciplinary in Digital Watermarking
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the Conference proceedings.

Last modified: 2016-03-02 23:43:08