ICCCC 2016 - International Conference on Cloud Computing & Cryptography ICCCC’16
Date2016-07-16 - 2016-07-18
Deadline2016-04-21
VenueSousse, Tunisia
Keywords
Websitehttps://www.gscit.org
Topics/Call fo Papers
Novel cryptographic protocols
ID-based and certificate less cryptosystems
Broadcast encryption, signcryption,
Designed confirmer
Identification / authentication schemes
Key agreement, Predicate encryption
SW / HW implementation
Secure operating systems
Efficient software implementation
FPGA or ASIC implementation
RFID security, Middleware security
Cloud Applications & Secure Environments
e-Business, e-Commerce, e-Governance, e-Government, e-Learning, e-Society
Green Cloud Networking
Incident Response Issues
Internet Architecture, Internet of Services, Internet Routing of Cloud data, Intra-Cloud vs Inter-Cloud Management
IPSec Quality of Service, Load Balancing, MANET Security
Mobile Cloud Networking, Follow-Me-
Network on the fly, Virtual control, Virtual radio, Isolation
New Novel Mechanism and Application for Cloud Computing
Outsourced Production Environments
Peer to Peer Data Management
Performance Development and Management
Security Challenges and Content Authoring
Security Stack, Security, Privacy, Confidentiality in Cloud networking
Semantic Web Technologies
Service and Systems Design and QoS Network Security
Service Composition, Discovery, Innovation, Marketing and Management, Modeling and Specification, Monitoring and Control, Strategy
Smart Homes and its Business Model
Virtual Ethernet Switching, Data Center
Virtualization of Wireless Equipment
Wireless Sensor Network Security
Cloud Computing
Cloud Application Architectures
Cloud Applications Performance and Monitoring
Cloud Middleware Frameworks
Collective Intelligence Context-aware Computing and Peer to Peer Computing
Context-Awareness & Data Mining
Data Centers, Data Grids
Data Models for Production Systems and Services
Distributed Information Systems
ID-based and certificate less cryptosystems
Broadcast encryption, signcryption,
Designed confirmer
Identification / authentication schemes
Key agreement, Predicate encryption
SW / HW implementation
Secure operating systems
Efficient software implementation
FPGA or ASIC implementation
RFID security, Middleware security
Cloud Applications & Secure Environments
e-Business, e-Commerce, e-Governance, e-Government, e-Learning, e-Society
Green Cloud Networking
Incident Response Issues
Internet Architecture, Internet of Services, Internet Routing of Cloud data, Intra-Cloud vs Inter-Cloud Management
IPSec Quality of Service, Load Balancing, MANET Security
Mobile Cloud Networking, Follow-Me-
Network on the fly, Virtual control, Virtual radio, Isolation
New Novel Mechanism and Application for Cloud Computing
Outsourced Production Environments
Peer to Peer Data Management
Performance Development and Management
Security Challenges and Content Authoring
Security Stack, Security, Privacy, Confidentiality in Cloud networking
Semantic Web Technologies
Service and Systems Design and QoS Network Security
Service Composition, Discovery, Innovation, Marketing and Management, Modeling and Specification, Monitoring and Control, Strategy
Smart Homes and its Business Model
Virtual Ethernet Switching, Data Center
Virtualization of Wireless Equipment
Wireless Sensor Network Security
Cloud Computing
Cloud Application Architectures
Cloud Applications Performance and Monitoring
Cloud Middleware Frameworks
Collective Intelligence Context-aware Computing and Peer to Peer Computing
Context-Awareness & Data Mining
Data Centers, Data Grids
Data Models for Production Systems and Services
Distributed Information Systems
Other CFPs
- International Conference on Computer Vision and Pattern Recognition ICCVPR’16
- International Conference on Education & eLearning Innovations ICEELI’16
- 2016 Global Summit on Computer & Information Technology GSCIT 2016
- World Symposium on Mechatronics Engineering & Applied Physics (WSMEAP’ 2016)
- 4th Workshop on Egocentric (First-Person) Vision 2016
Last modified: 2016-03-28 14:37:38