| |||||||||||
ISP 2010 : 2010 International Conference on Information Security and Privacy | |||||||||||
Link: http://www.promoteresearch.org | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
The scope of the conference includes all areas of information security, privacy, cryptography and all related areas. Sample topics include but WILL NOT be limited to:
* Access Control * Accounting and Audit * Agent and Mobile Code Security * Anonymity and Pseudonymity * Antitamper and TEMPEST * Applied Cryptography * Attacks and Prevention of Online Fraud * Authentication, Authorization and Access Control * Authentication and Nonrepudiation * Biometrics * Block/Stream Ciphers * Cell phone, PDA and Potable Device Security * Computer Forensics * Copyright Protection * Cryptanalysis * Cryptographic Protocols and Functions * Cyberattack and Cyberterrorism * Data Integrity and Privacy * Database and System Security * Design and Analysis of Cryptographic Algorithms * Digital Rights Management * Digital Signatures * Distributed System Security * Ebomb and Electronic Attack * ECommerce and EGovernment Security * Economics of Security and Privacy * Efficient Implementations * Electronic Commerce * Elliptic Curve Cryptosystems * Firewall, IDS, Antivirus and other Security Products * Formal Methods in Security * Foundations of Computer Security * Hash Functions * Identity and Trust Management * Information Hiding and Watermarking * Information Warfare and Countermeasures * Infrastructure Security * Intellectual Property Protection * Internet and Web Services Security * Intranet Security * Intrusion Detection, Tolerance and Prevention * Key Management and Recovery * Key/Identity Management * Malicious Codes * Mobile and Ad hoc network security * Mobile, Ad Hoc and Sensor and Wireless Network Security * New Theory and Paradigms for Security * Operating System Security * Peer-to-Peer Network Security * Personnel Security and Privacy * Physical Security and Soldier Security * PKI and PMI * Private Searches * Public Key Cryptosystems * Public Key Infrastructure * RFID, Sensor Network, Ubiquitous Computing Security * Secret Sharing * Secure Hardware and Software Design * Security and Privacy in Pervasive/Ubiquitous Computing * Security Education and Training * Security Engineering and Its Application * Security Evaluation Criteria and Methodology * Security for Mobile Code * Security in Development Processes * Security in Information Flow * Security in System/Software/Product Development Site * Security Level Definition Criteria and Its Application * Security Management * Security Maturity Model * Security Modeling and Architectures * Security Models for Ambient Intelligence environments * Security of eCommerce, eBusiness and eGovernment * Security of Grid Computing * Security Policy, Strategy and Management * Security Requirements Engineering * Sensortoshooter/Command Control System Security * Smart/Java Cards * Smartcards and Chip Security * Special Session on Hashing * Tactical Communication and Network Security * Trust Negotiation, Establishment and Management * Trusted Computing * Usable Security * Vulnerability, Threat, and Risk Analysis * Zero Knowledge |
|