Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    ICCCIS 2012 - International Conference on Cryptography, Coding and Information Security (ICCCIS 2012)

    View: 1379

    Website www.waset.org/events.php | Want to Edit it Edit Freely

    Category ICCCIS 2012

    Deadline: June 29, 2012 | Date: November 14, 2012-November 16, 2012

    Venue/Country: Ve nice, Italy

    Updated: 2011-06-29 16:38:51 (GMT+9)

    Call For Papers - CFP

    The VIII. International Conference on Cryptography, Coding and Information Security is the premier forum for the presentation of new advances and research results in the fields of Cryptography, Coding and Information Security. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to:

    Computational Intelligence in Security

    Artificial Immune Systems

    Biological Computing

    Evolutionary Computation

    Intelligent Agents and Systems

    Machine Learning

    Support Vector Machine

    Reinforcement Learning

    Unsupervised Learning

    Autonomy-Oriented Computing

    Coevolutionary Algorithms

    Fuzzy Systems

    Molecular Computing

    Neural Computing

    Swarm Intelligence

    Probabilistic Reasoning

    Information Security

    Cryptographic Protocols

    Detection of Abnormality

    Information Storage and Retrieval System

    Information Security Management

    Information Hiding

    Network & Wireless Security

    Security Models and Architectures

    Web and Wireless Security

    Cryptography and Coding

    Electronic Commerce Security

    Information, Data and System Integrity

    Intrusion Detection

    Mobile Code & Agent Security

    Security Analysis Methodologies

    Steganography and watermarking

    Access Control and Intrusion Detection

    Intrusion Detection and Vulnerability Assessment

    Authentication and Non-repudiation

    Identification and Authentication

    Insider Threats and Countermeasures

    Intrusion Detection & Prevention

    Identity and Trust Management

    Biometric Security

    Trust models and metrics

    Regulation and Trust Mechanisms

    Data Integrity

    Models for Authentication, Trust and Authorization

    Access Control in Computing Environments

    Multiuser Information

    Network Security and Protocols

    IPsec, VPNs and encryption modes

    Service and Systems Design and QoS Network Security

    Fairness Scheduling and QoS Guarantee

    Reliability and Dependability

    Web Performance and Reliability

    Denial of Service and other attacks

    Data and Systems Security

    Data Access & Synchronization

    GPRS and CDMA Security

    Mobile System Security

    Ubiquitous Computing Security

    Security in Localization systems

    Sensor and Mobile Ad Hoc Network Security

    Wireless Network Security (WiFi, WiMAX, WiMedia and others)

    Security of GSM/GPRS/UMTS systems

    Peer-to-Peer Security

    E-commerce protocols and micropayment schemes

    Cryptographic Techniques and Key Management

    Smart Card Security

    Public Key Crypto Applications

    Coding Theory and Practice

    Spread Spectrum Systems

    Speech/Image Coding

    Shannon Theory

    Stochastic Processes

    Quantum Information Processing

    Mobile Code & Agent Security

    Digital Rights Management

    Information Assurance

    Planning Security

    Risk Assessment

    Security Area Control

    Organizational Security Policies and Responsability

    Security Through Collaboration

    Human Factors and Human Behaviour Recognition Techniques

    Ethical and Legal Implications

    Intrusive, Explicit Security vs. Invisible, Implicit Computing

    Information Hiding

    Information Systems Auditing

    Management of Computing Security

    Security in Information Systems

    Security for Grid Computing

    Secure Software Development Methodologies

    Security for Web Services

    Security for Databases and Data Warehouses

    E-Health

    Security Engineering

    Security Information Systems Architectures

    Security requirements

    Security Metrics

    Personal Data Protection

    XML Security

    Workflow and Business Process Security

    Applications

    Bioinformatics and Medical Diagnosis

    Copyright Protection

    Data Mining

    Detection of Hidden

    Digital Signatures

    Financial engineering

    Intelligent Information Retrieval

    Financial Engineering

    BSS & ICA

    Cryptography and Its Applications

    Data Privacy

    Communication Channels

    Electronic Commerce Security

    Image and Signal Processing

    Pattern Recognition

    Web and Network Application Contact us: infoatwaset.org


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.