CSIA 2016 - Seventh International Conference on Communications Security & Information Assurance (CSIA 2016)
Date2016-09-24 - 2016-09-25
Deadline2016-06-18
VenueDubai,UAE, UAE - United Arab Emirates
KeywordsAccess control; Anonymity; Aud; Applied cryptography; Cryptana; Biometric security
Topics/Call fo Papers
? Access control, Anonymity, Audit and audit reduction & Authentication and authorization
? Applied cryptography, Cryptanalysis, Digital Signatures
? Biometric security
? Boundary control devices
? Certification and accreditation
? Cross-layer design for security
? Data and system integrity, Database security
? Defensive information warfare
? Denial of service protection, Intrusion Detection, Anti-malware
? Distributed systems security
? Electronic commerce
? E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection
? Grid security
? Information hiding and watermarking & Information survivability
? Insider threat protection, Integrity
? Intellectual property protection
? Internet/Intranet Security
? Key management and key recovery
? Language-based security
? Mobile and wireless security
? Mobile, Ad Hoc and Sensor Network Security
? Monitoring and surveillance
? Multimedia security ,Operating system security, Peer-to-peer security
? Performance Evaluations of Protocols & Security Application
? Privacy and data protection
? Product evaluation criteria and compliance
? Risk evaluation and security certification
? Risk/vulnerability assessment
? Security & Network Management
? Security and Assurance in Operational, Technological, commercial Area
? Security Engineering and Its Application
? Security Models & protocols
? Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
? Trusted computing
? Ubiquitous Computing Security
? Virtualization security, VoIP security, Web 2.0 security
? Applied cryptography, Cryptanalysis, Digital Signatures
? Biometric security
? Boundary control devices
? Certification and accreditation
? Cross-layer design for security
? Data and system integrity, Database security
? Defensive information warfare
? Denial of service protection, Intrusion Detection, Anti-malware
? Distributed systems security
? Electronic commerce
? E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection
? Grid security
? Information hiding and watermarking & Information survivability
? Insider threat protection, Integrity
? Intellectual property protection
? Internet/Intranet Security
? Key management and key recovery
? Language-based security
? Mobile and wireless security
? Mobile, Ad Hoc and Sensor Network Security
? Monitoring and surveillance
? Multimedia security ,Operating system security, Peer-to-peer security
? Performance Evaluations of Protocols & Security Application
? Privacy and data protection
? Product evaluation criteria and compliance
? Risk evaluation and security certification
? Risk/vulnerability assessment
? Security & Network Management
? Security and Assurance in Operational, Technological, commercial Area
? Security Engineering and Its Application
? Security Models & protocols
? Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
? Trusted computing
? Ubiquitous Computing Security
? Virtualization security, VoIP security, Web 2.0 security
Other CFPs
- The 2016 IEEE International Conference on Intelligent Transportation Engineering
- IJCU Journals (http://ijcu.us/)
- 12th Dynamic Languages Symposium (DLS 2016)
- IEEE International Conference on Bioinformatics and Biomedicine 2016 (BIBM 2016)
- 2016 Workshop on Accelerator-Enabled Algorithms and Applications in Bioinformatics
Last modified: 2016-05-20 14:27:13