ICCCIS 2012 - International Conference on Cryptography, Coding and Information Security (ICCCIS 2012)
View: 1379
Website www.waset.org/events.php |
Edit Freely
Category ICCCIS 2012
Deadline: June 29, 2012 | Date: November 14, 2012-November 16, 2012
Venue/Country: Ve nice, Italy
Updated: 2011-06-29 16:38:51 (GMT+9)
Call For Papers - CFP
The VIII. International Conference on Cryptography, Coding and Information Security is the premier forum for the presentation of new advances and research results in the fields of Cryptography, Coding and Information Security. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to: Computational Intelligence in Security Artificial Immune Systems Biological Computing Evolutionary Computation Intelligent Agents and Systems Machine Learning Support Vector Machine Reinforcement Learning Unsupervised Learning Autonomy-Oriented Computing Coevolutionary Algorithms Fuzzy Systems Molecular Computing Neural Computing Swarm Intelligence Probabilistic ReasoningInformation Security Cryptographic Protocols Detection of Abnormality Information Storage and Retrieval System Information Security Management Information Hiding Network & Wireless Security Security Models and Architectures Web and Wireless Security Cryptography and Coding Electronic Commerce Security Information, Data and System Integrity Intrusion Detection Mobile Code & Agent Security Security Analysis Methodologies Steganography and watermarking Access Control and Intrusion Detection Intrusion Detection and Vulnerability Assessment Authentication and Non-repudiation Identification and Authentication Insider Threats and Countermeasures Intrusion Detection & Prevention Identity and Trust Management Biometric Security Trust models and metrics Regulation and Trust Mechanisms Data Integrity Models for Authentication, Trust and Authorization Access Control in Computing Environments Multiuser Information Network Security and Protocols IPsec, VPNs and encryption modes Service and Systems Design and QoS Network Security Fairness Scheduling and QoS Guarantee Reliability and Dependability Web Performance and Reliability Denial of Service and other attacks Data and Systems Security Data Access & Synchronization GPRS and CDMA Security Mobile System Security Ubiquitous Computing Security Security in Localization systems Sensor and Mobile Ad Hoc Network Security Wireless Network Security (WiFi, WiMAX, WiMedia and others) Security of GSM/GPRS/UMTS systems Peer-to-Peer Security E-commerce protocols and micropayment schemes Cryptographic Techniques and Key Management Smart Card Security Public Key Crypto Applications Coding Theory and Practice Spread Spectrum Systems Speech/Image Coding Shannon Theory Stochastic Processes Quantum Information Processing Mobile Code & Agent Security Digital Rights Management Information Assurance Planning Security Risk Assessment Security Area Control Organizational Security Policies and Responsability Security Through Collaboration Human Factors and Human Behaviour Recognition Techniques Ethical and Legal Implications Intrusive, Explicit Security vs. Invisible, Implicit Computing Information Hiding Information Systems Auditing Management of Computing Security Security in Information Systems Security for Grid Computing Secure Software Development Methodologies Security for Web Services Security for Databases and Data Warehouses E-Health Security Engineering Security Information Systems Architectures Security requirements Security Metrics Personal Data Protection XML Security Workflow and Business Process Security Applications Bioinformatics and Medical Diagnosis Copyright Protection Data Mining Detection of Hidden Digital Signatures Financial engineering Intelligent Information Retrieval Financial Engineering BSS & ICA Cryptography and Its Applications Data Privacy Communication Channels Electronic Commerce Security Image and Signal Processing Pattern Recognition Web and Network Application Contact us: infowaset.org
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.