posted by user: FUN0524 || 4862 views || tracked by 11 users: [display]

ICSST 2013 : 2013 the 2nd International Conference on Security Science and Technology

FacebookTwitterLinkedInGoogle

Link: http://www.icsst.org/
 
When Apr 1, 2013 - Apr 2, 2013
Where Singapore
Submission Deadline Jan 25, 2013
Notification Due Feb 20, 2013
Final Version Due Mar 5, 2013
Categories    security   information systems   electronics   science
 

Call For Papers

Call For Papers
ICSST 2013, aims to bring together researchers, scientists, engineers, and scholar students to exchange and share their experiences, new ideas, and research results about all aspects of Security Science and Technology, and discuss the practical challenges encountered and the solutions adopted.

Topics of interest include, but are not limited to:

•Access control and secure audit
Analysis of security protocols
Anonymity services
Authentication and Authorization
Avionics and Automobile Software
Biometrics
Computer Forensics
Content Production and Distribution Systems, Mobile and Multi-channel Systems
Context Awareness Computing
Critical Infrastructures Protection
Cryptographic primitives
Cryptography and its Applications
Data and Systems Integrity
Design and Analysis of Cryptosystems
Electronic Commerce Security
Electronic payment systems
Enforcement of security policies
Formal Methods and Approaches to Manage and Control Complex Systems
Fraud Control and Information Hiding
Human Factors and Collaborative Aspects
Information and Security Assurance
Integration of Heterogeneous Technologies
Intellectual Property Protection
Interoperability and Standardization
Intrusion Detection and Response
Key Management and Key Recovery
Language-based security
Mobile Communications Security
Network Security
Pervasive and Ubiquitous Computing
Privacy and identity management
Privacy Protection
Real-time and Embedded Systems
Risk Evaluation and Security Certification
Secure mobile code
Secure operating systems
Security and privacy in business services
Security engineering
Security in ubiquitous computing
Security Models
Security Protocols
Security requirements engineering
Security verification
Sensor Network Systems and Applications
Smart Cards
Software and System Development and Control Processes for Complex Systems
Software Architecture and System Engineering
Software Complexity Visualization
Software Protection
Systems and Software Safety and Security
Tools, Environments, and Languages for Complex Systems
Trust Management
Usable security
Verification Techniques for Complex Software Systems
Virtual Environments for Managing Complexity
Vulnerability and threat analysis
Watermarking
Web Services Modeling and Compositions

Publications
All accepted papers will be published in the volume of International Journal of Engineering and Technology (IJET) (ISSN; 1793-8244 (Online Version); 1793-8236 (Print Version)), and will be included in the Engineering & Technology Library, indexed by Google Scholar EBSCO, CrossRef and Worldcat.


Submission Methods:
Email Submission: icsst@iacsit.org

Related Resources

ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
Ei/Scopus-SGGEA 2025   2025 2nd Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2025)
IEEE- CCRIS 2025   2025 IEEE 6th International Conference on Control, Robotics and Intelligent System (CCRIS 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-ACAI 2025   2025 IEEE 8th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2025)
ICIST 2026   2026 The 5th International Conference on Intelligent Science and Technology (ICIST 2026)
CSTY 2025   11th International Conference on Computer Science and Information Technology
ICIST--EI 2026   2026 The 5th International Conference on Intelligent Science and Technology (ICIST 2026)
STIiG 2025   Aligning Science-Technology-Innovation (STI) Indicators for Effective R&D Governance