| |||||||||||||||
ISCISC 2011 : 8th International ISC Conference on Information Security and Cryptology | |||||||||||||||
Link: http://iscisc2011.um.ac.ir | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) is an opportunity for researchers to share their contemporary knowledge in information security and cryptology area. The 8th ISCISC conference (ISCISC’11) is organized by Ferdowsi University of Mashhad in co-operation with ISC and will be held in Mashhad.
The purpose of ISCISC 2011, the International ISC Conference on Information Security and Cryptology, is to bring together researchers, engineers and practitioners interested in various aspects of information security and cryptology. The conference aims to provide an opportunity for academicians and specialists in a national and international scope to meet and discuss the latest developments in theory, emerging technologies, and progress in standards, services and their applications in various areas of information security. Special sessions, case-studies and tutorials dedicated to technical/scientific topics related to the conference are also envisaged. Researchers interested in organizing a special session or holding a tutorial, or companies interested in presenting their products/methodologies are invited to contact the conference secretariat. Topics ISCISC 2011 Topics Fundamentals of Cryptology Fundamentals of Cryptography Information Hiding Information Hiding Algorithms (Steganography, Watermarking, Covert, Channel, …) Private Key Encryption Algorithms Analysis and Evaluation Public Key Encryption Algorithms Implementation and applications to hide information Cryptanalysis and Evaluation Cryptography & Security Protocols Authorization, Identification and Authentication Cryptography function (Hashing, Authenticity Verification Code, …) Privacy and Anonymity Implementation of Cryptograpy Algorithms Hardware Implementation Cryptography Algorithms Availability Software Implementation Cryptography Algorithms Access Control and Trust Management Embedded System Cryptography Formal Methods in Information Security Security of Systems & Applications Operating System Security Security Management Vulnerabilities & Penetration Test Database Security Secure Software Engineering / Software Security Network Security Social Engineering & Security E-Business Security ISMS Security in New Computational Environments Security Training Auditing, Intrusion Detection & Prevention Other Related Topics Publication All submitted papers (max. 6 pages) are reviewed and commented on by referees. Accepted papers will appear in the Proceedings of ISCISC’11 as well as the Conference CD, on the condition of being presented in the Conference. All presented papers will be included in the conference proceedings and will be published through IEEE Xplore digital library. Also, Selected papers from the conference will be considered for publication in ISeCure (The ISC International Journal of Information Security). Paper Submission The IEEE standard must be observed by authors. The guidelines for paper formatting and a template are available on our website. The conference language is both Persian and English. |
|