ICSST 2012 - 2012 International Conference on Security Science and Technology
View: 3296
Website http://www.icsst.org/ |
Edit Freely
Category Security Science; Technology
Deadline: January 20, 2012 | Date: March 10, 2012-March 12, 2012
Venue/Country: Hong Kong, Hong Kong
Updated: 2011-12-26 13:14:30 (GMT+9)
Call For Papers - CFP
Call for Papers 2012 International Conference on Security Science and Technology (ICSST 2012) is the premier forum for the presentation of new advances and research results in the fields of theoretical, experimental, and applied Security Science and Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to: Access control and secure auditAnalysis of security protocolsAnonymity servicesAuthentication and AuthorizationAvionics and Automobile SoftwareBiometricsComputer ForensicsContent Production and Distribution Systems, Mobile and Multi-channel SystemsContext Awareness ComputingCritical Infrastructures ProtectionCryptographic primitivesCryptography and its ApplicationsData and Systems IntegrityDesign and Analysis of CryptosystemsElectronic Commerce SecurityElectronic payment systemsEnforcement of security policiesFormal Methods and Approaches to Manage and Control Complex SystemsFraud Control and Information HidingHuman Factors and Collaborative AspectsInformation and Security AssuranceIntegration of Heterogeneous TechnologiesIntellectual Property ProtectionInteroperability and StandardizationIntrusion Detection and ResponseKey Management and Key RecoveryLanguage-based securityMobile Communications SecurityNetwork SecurityPervasive and Ubiquitous ComputingPrivacy and identity managementPrivacy ProtectionReal-time and Embedded SystemsRisk Evaluation and Security CertificationSecure mobile codeSecure operating systemsSecurity and privacy in business servicesSecurity engineeringSecurity in ubiquitous computingSecurity ModelsSecurity ProtocolsSecurity requirements engineeringSecurity verificationSensor Network Systems and ApplicationsSmart CardsSoftware and System Development and Control Processes for Complex SystemsSoftware Architecture and System EngineeringSoftware Complexity VisualizationSoftware ProtectionSystems and Software Safety and SecurityTools, Environments, and Languages for Complex SystemsTrust ManagementUsable securityVerification Techniques for Complex Software SystemsVirtual Environments for Managing ComplexityVulnerability and threat analysisWatermarkingWeb Services Modeling and Compositions The selected papers of ICSST 2012 will be published in the IPCSIT (ISSN: 2010-460X) as one volume, and will be included in the Engineering & Technology Digital Library, and indexed by EBSCO, CNKI (中国知网), WorldCat, Google Scholar, and sent to be reviewed by Ei Compendex and ISI Proceedings.SUBMISSION METHODS:1. Electronic Submission System; ( .pdf)If you can't login the submission system, please try to submit through method 2.2. Email: icsst
vip.163.com ( .pdf and .doc)
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.