SAM 2011 - SAM'11 - The 2011 International Conference on Security and Management
Topics/Call fo Papers
You are invited to submit a full paper for consideration. All accepted papers will be published in the SAM conference proceedings (in printed book form; later, the proceedings will also be accessible online). Those interested in proposing workshops/sessions, should refer to the relevant sections that appear below.
Topics of interest include, but are not limited to, the following:
Security algorithms
Security in e-Commerce and m-Commerce
Surveillance technologies
Novel biometric methods
Security protocols
Firewall systems
Key management techniques
Mobile network security
Hacking techniques and related issues
Security policies
Secure OS
Security in CDN (Contents Distribution Networks)
Security for protocol management (SNMP, CMIP, etc)
Location management
QoS management
Resource management
Channel management
Mobility management
Encryption technologies
VPN
IDS (Intrusion Detection System)
Digital contents copyright protection techniques
Watermarking
Honeypot
Virus issues (detection, prevention, ...)
Tracing techniques in internet
Active networks
Security in grid
Biological security technologies
High-tech systems at airports
Face recognition systems
Signature recognition systems
System security management
Network security management
Management in network equipments
SAN (Storage Area Networks) management
Applications of block and stream ciphers
Applications of public key cryptology
Message authentication and hash functions
Grid computing and security
Cloud computing and security
Web monitoring
Trust computing
Emerging technologies and applications
Mission Assurance
Risk Assessment and Risk Management
Continuity of Operations and Business Impact Analysis
Topics of interest include, but are not limited to, the following:
Security algorithms
Security in e-Commerce and m-Commerce
Surveillance technologies
Novel biometric methods
Security protocols
Firewall systems
Key management techniques
Mobile network security
Hacking techniques and related issues
Security policies
Secure OS
Security in CDN (Contents Distribution Networks)
Security for protocol management (SNMP, CMIP, etc)
Location management
QoS management
Resource management
Channel management
Mobility management
Encryption technologies
VPN
IDS (Intrusion Detection System)
Digital contents copyright protection techniques
Watermarking
Honeypot
Virus issues (detection, prevention, ...)
Tracing techniques in internet
Active networks
Security in grid
Biological security technologies
High-tech systems at airports
Face recognition systems
Signature recognition systems
System security management
Network security management
Management in network equipments
SAN (Storage Area Networks) management
Applications of block and stream ciphers
Applications of public key cryptology
Message authentication and hash functions
Grid computing and security
Cloud computing and security
Web monitoring
Trust computing
Emerging technologies and applications
Mission Assurance
Risk Assessment and Risk Management
Continuity of Operations and Business Impact Analysis
Other CFPs
- SWWS'11 - The 2011 International Conference on Semantic Web and Web Services
- BIOCOMP'11 - The 2011 International Conference on Bioinformatics & Computational Biology
- CGVR'11 - The 2011 International Conference on Computer Graphics and Virtual Reality
- ERSA’11: Engineering of Reconfigurable Systems and Algorithms
- FCS'11 - The 2011 International Conference on Foundations of Computer Science
Last modified: 2010-12-12 22:59:07