SAM 2012 - The International Conference on Security and Management (SAM)
Topics/Call fo Papers
Topics of interest include, but are not limited to, the following:
Security algorithms
Security in e-Commerce and m-Commerce
Surveillance technologies
Security protocols
Firewall systems
Key management techniques
Mobile network security
Hacking techniques and related issues
Security policies
Secure OS
Security in CDN (Contents Distribution Networks)
Security for protocol management (SNMP, CMIP, etc)
Location management
QoS management
Resource management
Channel management
Mobility management
Encryption technologies
VPN
IDS (Intrusion Detection System)
Digital contents copyright protection techniques
Watermarking
Honeypot
Virus issues (detection, prevention, ...)
Tracing techniques in internet
Active networks
Security in grid
Biological security technologies
High-tech systems at airports
Face recognition systems
Signature recognition systems
System security management
Network security management
Management in network equipments
SAN (Storage Area Networks) management
Applications of block and stream ciphers
Applications of public key cryptology
Message authentication and hash functions
Grid computing and security
Cloud computing and security
Web monitoring
Trust computing
Emerging technologies and applications
Security algorithms
Security in e-Commerce and m-Commerce
Surveillance technologies
Security protocols
Firewall systems
Key management techniques
Mobile network security
Hacking techniques and related issues
Security policies
Secure OS
Security in CDN (Contents Distribution Networks)
Security for protocol management (SNMP, CMIP, etc)
Location management
QoS management
Resource management
Channel management
Mobility management
Encryption technologies
VPN
IDS (Intrusion Detection System)
Digital contents copyright protection techniques
Watermarking
Honeypot
Virus issues (detection, prevention, ...)
Tracing techniques in internet
Active networks
Security in grid
Biological security technologies
High-tech systems at airports
Face recognition systems
Signature recognition systems
System security management
Network security management
Management in network equipments
SAN (Storage Area Networks) management
Applications of block and stream ciphers
Applications of public key cryptology
Message authentication and hash functions
Grid computing and security
Cloud computing and security
Web monitoring
Trust computing
Emerging technologies and applications
Other CFPs
- The International Conference on Modeling, Simulation and Visualization Methods (MSV)
- The International Conference on Information and Knowledge Engineering (IKE)
- The International Conference on Internet Computing (ICOMP)
- The International Conference on Genetic and Evolutionary Methods (GEM)
- The International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS)
Last modified: 2011-12-08 20:01:36