posted by user: ijcsi || 4828 views || tracked by 10 users: [display]

IJCSI - Security 2009 : CALL FOR PAPERS International Journal of Computer Science Issues - IJCSI - July 2009 - Security Systems and Technologies (Volume 2)

FacebookTwitterLinkedInGoogle

Link: http://www.ijcsi.org
 
When N/A
Where N/A
Submission Deadline Jul 3, 2009
Notification Due Jul 19, 2009
Categories    security   cryptography   mobile   internet
 

Call For Papers

CALL FOR PAPERS International Journal of Computer Science Issues - IJCSI - July 2009 - Security Systems and Technologies (Volume 2)

Deadline: 03 July 2009
Notification: 19 July 2009
Online Publication: 31 July 2009

The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling

Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance

Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security

Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services

Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability

Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning

Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./

Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems

For other information, please contact IJCSI Managing Editor, (editor@ijcsi.org)
Website: http://www.ijcsi.org

Related Resources

ECCSIT 2023   2023 European Conference on Computer Science and Information Technology (ECCSIT 2023)
IEEE COINS 2023   IEEE COINS 2023 - Berlin, Germany - July 23-25 - Hybrid (In-Person & Virtual)
IEEE/ACM ASONAM 2023   The 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
AIFZ 2023   9th International Conference on Artificial Intelligence and Fuzzy Logic Systems
EI-CFAIS 2023   2023 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2023)
CEVVE 2023   2023 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2023)
ICSC 2024   IEEE International Conference on Semantic Computing
AME 2023   9th International Conference on Advances in Mechanical Engineering
CSAE 2023   The 7th International Conference on Computer Science and Application Engineering
ISCSIC 2023   2023 7th International Symposium on Computer Science and Intelligent Control(ISCSIC 2023)