posted by user: jmheralds || 9869 views || tracked by 20 users: [display]

ISP 2010 : 2010 International Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.promoteresearch.org
 
When Jul 12, 2010 - Jul 14, 2010
Where Orlando, USA
Submission Deadline May 31, 2010
Categories    security   cryptography   computer networks   privacy
 

Call For Papers

The scope of the conference includes all areas of information security, privacy, cryptography and all related areas. Sample topics include but WILL NOT be limited to:

* Access Control
* Accounting and Audit
* Agent and Mobile Code Security
* Anonymity and Pseudonymity
* Antitamper and TEMPEST
* Applied Cryptography
* Attacks and Prevention of Online Fraud
* Authentication, Authorization and Access Control
* Authentication and Nonrepudiation
* Biometrics
* Block/Stream Ciphers
* Cell phone, PDA and Potable Device Security
* Computer Forensics
* Copyright Protection
* Cryptanalysis
* Cryptographic Protocols and Functions
* Cyberattack and Cyberterrorism
* Data Integrity and Privacy
* Database and System Security
* Design and Analysis of Cryptographic Algorithms
* Digital Rights Management
* Digital Signatures
* Distributed System Security
* Ebomb and Electronic Attack
* ECommerce and EGovernment Security
* Economics of Security and Privacy
* Efficient Implementations
* Electronic Commerce
* Elliptic Curve Cryptosystems
* Firewall, IDS, Antivirus and other Security Products
* Formal Methods in Security
* Foundations of Computer Security
* Hash Functions
* Identity and Trust Management
* Information Hiding and Watermarking
* Information Warfare and Countermeasures
* Infrastructure Security
* Intellectual Property Protection
* Internet and Web Services Security
* Intranet Security
* Intrusion Detection, Tolerance and Prevention
* Key Management and Recovery
* Key/Identity Management
* Malicious Codes
* Mobile and Ad hoc network security
* Mobile, Ad Hoc and Sensor and Wireless Network Security
* New Theory and Paradigms for Security
* Operating System Security
* Peer-to-Peer Network Security
* Personnel Security and Privacy
* Physical Security and Soldier Security
* PKI and PMI
* Private Searches
* Public Key Cryptosystems
* Public Key Infrastructure
* RFID, Sensor Network, Ubiquitous Computing Security
* Secret Sharing
* Secure Hardware and Software Design
* Security and Privacy in Pervasive/Ubiquitous Computing
* Security Education and Training
* Security Engineering and Its Application
* Security Evaluation Criteria and Methodology
* Security for Mobile Code
* Security in Development Processes
* Security in Information Flow
* Security in System/Software/Product Development Site
* Security Level Definition Criteria and Its Application
* Security Management
* Security Maturity Model
* Security Modeling and Architectures
* Security Models for Ambient Intelligence environments
* Security of eCommerce, eBusiness and eGovernment
* Security of Grid Computing
* Security Policy, Strategy and Management
* Security Requirements Engineering
* Sensortoshooter/Command Control System Security
* Smart/Java Cards
* Smartcards and Chip Security
* Special Session on Hashing
* Tactical Communication and Network Security
* Trust Negotiation, Establishment and Management
* Trusted Computing
* Usable Security
* Vulnerability, Threat, and Risk Analysis
* Zero Knowledge



Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSP--EI 2026   2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
MLAIJ 2025   Machine Learning and Applications: An International Journal
ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
ITCCMA 2025   12th International Conference on Information Technology, Control, Chaos, Modeling and Applications
SPIE ICDIP 2026   SPIE--2026 The 18th International Conference on Digital Image Processing (ICDIP 2026)
IWSEC 2025   The 20th International Workshop on Security (2nd Submission)
ICAIBD 2026   IEEE--2026 The 9th International Conference on Artificial Intelligence and Big Data (ICAIBD 2026)
IJFCST 2025   International Journal on Foundations of Computer Science & Technology
CSP 2026   2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)