Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    ICINS 2015 - IACSIT- 2015 2nd International Conference on Information and Network Security

    View: 1337

    Website http://www.icins.org/ | Want to Edit it Edit Freely

    Category Information and Network Security

    Deadline: May 15, 2015 | Date: July 29, 2015-July 30, 2015

    Venue/Country: Shanghai, China

    Updated: 2015-04-23 16:46:10 (GMT+9)

    Call For Papers - CFP

    IACSIT- 2015 2nd International Conference on Information and Network Security

    ICINS 2015

    July 29-30, 2015 in Shanghai, China

    http://www.icins.org/

    E-mail: icinsatiacsit.org

    Tel: +86-28-86528758

    Paper Submission:2015-05-15

    Topics of interest for submission include, but are not limited to:

    Security of Web-based applications and services

    Anti-malware techniques: detection, analysis, and prevention

    Intrusion prevention, detection, and response

    Security for electronic voting

    Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques

    Privacy and anonymity technologies

    Network perimeter controls: firewalls, packet filters, and application gateways

    Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems

    Security for Vehicular Ad-hoc Networks (VANETs)

    Security for peer-to-peer and overlay network systems

    Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing

    Implementation, deployment and management of network security policies

    Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management

    Integrating security services with system and application security facilities and protocols

    Public key infrastructures, key management, certification, and revocation

    Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost

    Security for collaborative applications: teleconferencing and video-conferencing

    Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)

    Security for large-scale systems and critical infrastructures

    Integrating security in Internet protocols: routing, naming, network management

    PULICATION

    All accepted papers will be selected and published in One of the following Journals.

    -- WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517)

    Indexed by EI Compendex, Scopus and ISI.

    -- International Journal of Communications (JCM, 1796-2021)

    Indexed by Scopus and EI Compendex

    Contact Us

    Ms. Yashin Tu

    E-mail: icinsatiacsit.org

    ICINS Website: http://www.icins.org/

    Complaint E-mail: complaintatiacsit.org

    Tel: +1-518-478-2659(USA)

    +8628-8652-8758 (China)


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.