posted by user: FUN0524 || 4698 views || tracked by 7 users: [display]

ICINS 2015 : 2015 2nd International Conference on Information and Network Security

FacebookTwitterLinkedInGoogle

Link: http://www.icins.org/
 
When Jul 29, 2015 - Jul 30, 2015
Where Shanghai, China
Submission Deadline May 15, 2015
Notification Due Jun 5, 2015
Final Version Due Jun 20, 2015
Categories    information security   network security   electronics
 

Call For Papers

2015 2nd International Conference on Information and Network Security (ICINS 2015)
July 29-30, 2015
Shanghai, China
http://www.icins.org/


Publication:
All accepted papers will be selected and published in One of the following Journals.
-- WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517)
Indexed by EI Compendex, Scopus and ISI.
-- International Journal of Communications (JCM, 1796-2021)
Indexed by Scopus and EI Compendex

Topics:
Security of Web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Intrusion prevention, detection, and response
Security for electronic voting
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Network perimeter controls: firewalls, packet filters, and application gateways
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Security for Vehicular Ad-hoc Networks (VANETs)
Security for peer-to-peer and overlay network systems
Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
Implementation, deployment and management of network security policies
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Integrating security services with system and application security facilities and protocols
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
Security for large-scale systems and critical infrastructures
Integrating security in Internet protocols: routing, naming, network management
For more topics: http://www.icins.org/cfp.html

Submission method:
Electronic Submission System; ( .pdf)
http://www.easychair.org/conferences/?conf=icins2015

Contact us:
Ms. Yashin Tu
E-mail: icins@iacsit.org
Tel: +1-518-478-2659
+86-28-86528758

Related Resources

CNSCT 2026   2026 5th International Conference on Cryptography, Network Security and Communication Technology
IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
ICIVP 2026   2026 2nd International Conference on Image and Video Processing (ICIVP 2026)
CRIS 2026   12th International Conference on Cryptography and Information Security
Ei/Scopus-CMLDS 2026   2026 3rd International Conference on Computing, Machine Learning and Data Science (CMLDS 2026)
ICRE--EI 2026   2026 10th International Conference on Reliability Engineering (ICRE 2026)
CVIPPR 2026   2026 4th Asia Conference on Computer Vision, Image Processing and Pattern Recognition (CVIPPR 2026)
ECCS--EI 2026   2026 the 6th European Conference on Communication Systems (ECCS 2026)
ICTC--SCI 2026   2026 7th Information Communication Technologies Conference (ICTC 2026)--SCI
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus