| |||||||||||||||
ICINS 2015 : 2015 2nd International Conference on Information and Network Security | |||||||||||||||
Link: http://www.icins.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
2015 2nd International Conference on Information and Network Security (ICINS 2015)
July 29-30, 2015 Shanghai, China http://www.icins.org/ Publication: All accepted papers will be selected and published in One of the following Journals. -- WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517) Indexed by EI Compendex, Scopus and ISI. -- International Journal of Communications (JCM, 1796-2021) Indexed by Scopus and EI Compendex Topics: Security of Web-based applications and services Anti-malware techniques: detection, analysis, and prevention Intrusion prevention, detection, and response Security for electronic voting Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques Privacy and anonymity technologies Network perimeter controls: firewalls, packet filters, and application gateways Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems Security for Vehicular Ad-hoc Networks (VANETs) Security for peer-to-peer and overlay network systems Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing Implementation, deployment and management of network security policies Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management Integrating security services with system and application security facilities and protocols Public key infrastructures, key management, certification, and revocation Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost Security for collaborative applications: teleconferencing and video-conferencing Software hardening: e.g., detecting and defending against software bugs (overflows, etc.) Security for large-scale systems and critical infrastructures Integrating security in Internet protocols: routing, naming, network management For more topics: http://www.icins.org/cfp.html Submission method: Electronic Submission System; ( .pdf) http://www.easychair.org/conferences/?conf=icins2015 Contact us: Ms. Yashin Tu E-mail: icins@iacsit.org Tel: +1-518-478-2659 +86-28-86528758 |
|