Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ISC 2011 - The 14th Information Security Conference (ISC 2011)

    View: 1654

    Website | Want to Edit it Edit Freely

    Category ISC 2011

    Deadline: May 10, 2011 | Date: October 26, 2011-October 28, 2011

    Venue/Country: Xi'an, China

    Updated: 2011-03-19 11:56:23 (GMT+9)

    Call For Papers - CFP

    The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), ISW 1999 in Malaysia (LNCS 1729), ISW 2000 in Australia (LNCS 1975) and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). The latest conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), and Chile (ISC'07, LNCS 4779), Chinese Taipei(ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), USA (ISC’10).

    Important Dates

    Paper submission deadline : May 10, 2011

    Notification of acceptance: July 15, 2011

    Proceedings version deadline :August 5, 2011

    The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series. Topics of interest include, but are not limited to:

    access control

    accountability

    anonymity and pseudonymity

    applied cryptography

    authentication

    biometrics

    computer forensics

    cryptographic protocols

    database security

    data protection

    data/system integrity

    digital right management

    economics of security and privacy

    electronic frauds

    formal methods in security

    identity management

    information dissemination control

    information hiding and watermarking

    intrusion detection

    network security

    peer-to-peer security

    privacy

    secure group communications

    security and privacy in pervasive/ubiquitous computing

    security in information flow

    security in IT outsourcing

    security for mobile code

    secure cloud computing

    security of eCommerce, eBusiness and eGovernment

    security in location services

    security modeling and architectures

    security models for ambient intelligence environments

    security in social networks

    trust models and trust management policies

    embedded security

    http://ste.xidian.edu.cn/isc2011/


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.