| |||||||||||||||
ICSST 2013 : 2013 the 2nd International Conference on Security Science and Technology | |||||||||||||||
Link: http://www.icsst.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call For Papers
ICSST 2013, aims to bring together researchers, scientists, engineers, and scholar students to exchange and share their experiences, new ideas, and research results about all aspects of Security Science and Technology, and discuss the practical challenges encountered and the solutions adopted. Topics of interest include, but are not limited to: •Access control and secure audit Analysis of security protocols Anonymity services Authentication and Authorization Avionics and Automobile Software Biometrics Computer Forensics Content Production and Distribution Systems, Mobile and Multi-channel Systems Context Awareness Computing Critical Infrastructures Protection Cryptographic primitives Cryptography and its Applications Data and Systems Integrity Design and Analysis of Cryptosystems Electronic Commerce Security Electronic payment systems Enforcement of security policies Formal Methods and Approaches to Manage and Control Complex Systems Fraud Control and Information Hiding Human Factors and Collaborative Aspects Information and Security Assurance Integration of Heterogeneous Technologies Intellectual Property Protection Interoperability and Standardization Intrusion Detection and Response Key Management and Key Recovery Language-based security Mobile Communications Security Network Security Pervasive and Ubiquitous Computing Privacy and identity management Privacy Protection Real-time and Embedded Systems Risk Evaluation and Security Certification Secure mobile code Secure operating systems Security and privacy in business services Security engineering Security in ubiquitous computing Security Models Security Protocols Security requirements engineering Security verification Sensor Network Systems and Applications Smart Cards Software and System Development and Control Processes for Complex Systems Software Architecture and System Engineering Software Complexity Visualization Software Protection Systems and Software Safety and Security Tools, Environments, and Languages for Complex Systems Trust Management Usable security Verification Techniques for Complex Software Systems Virtual Environments for Managing Complexity Vulnerability and threat analysis Watermarking Web Services Modeling and Compositions Publications All accepted papers will be published in the volume of International Journal of Engineering and Technology (IJET) (ISSN; 1793-8244 (Online Version); 1793-8236 (Print Version)), and will be included in the Engineering & Technology Library, indexed by Google Scholar EBSCO, CrossRef and Worldcat. Submission Methods: Email Submission: icsst@iacsit.org |
|