posted by user: ijcsi || 4552 views || tracked by 10 users: [display]

IJCSI - Security 2009 : CALL FOR PAPERS International Journal of Computer Science Issues - IJCSI - July 2009 - Security Systems and Technologies (Volume 2)

FacebookTwitterLinkedInGoogle

Link: http://www.ijcsi.org
 
When N/A
Where N/A
Submission Deadline Jul 3, 2009
Notification Due Jul 19, 2009
Categories    security   cryptography   mobile   internet
 

Call For Papers

CALL FOR PAPERS International Journal of Computer Science Issues - IJCSI - July 2009 - Security Systems and Technologies (Volume 2)

Deadline: 03 July 2009
Notification: 19 July 2009
Online Publication: 31 July 2009

The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling

Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance

Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security

Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services

Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability

Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning

Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./

Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems

For other information, please contact IJCSI Managing Editor, (editor@ijcsi.org)
Website: http://www.ijcsi.org

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
AI Meets Cybersecurity 2022   Call for Papers: AI Meets Cybersecurity from Journal of Intelligent Information Systems
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
Call for Papers 2022   Call for Papers Historical Yearbook 2022
Found Footage Magazine 2022   Found Footage Magazine - Call for Papers - 2022 Anual edition - Issue #9
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
SASIMI 2022   The 24th Workshop on Synthesis And System Integration of Mixed Information technologies
LATIN 2022   The 15th Latin American Theoretical Informatics Symposium
CSEIJ 2022   Computer Science & Engineering: An International Journal