Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    WCE 2010 - The 2010 International Conference of Information Security and Internet Engineering

    View: 2458

    Website http://www.iaeng.org/WCE2010/ | Want to Edit it Edit Freely

    Category WCE 2010

    Deadline: March 06, 2010 | Date: June 30, 2010

    Venue/Country: London, U.K.

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    The 2010 International Conference of Information Security and Internet Engineering

    London, U.K., 30 June - 2 July, 2010

    Conferences Publications Membership About IAENG FAQ Contact Us

    The 2010 International Conference of Information Security and Internet Engineering (ICISIE'10) will take place in London, U.K., 30 June - 2 July, 2010.

    The conference ICISIE'10 is held under the World Congress on Engineering 2010. The WCE 2010 is organized by the International Association of Engineers (IAENG), and serves as good platforms for the engineering community members to meet with each other and to exchange ideas. The last IAENG conferences attracted more than one thousand participants from over 30 countries. All submitted papers will be under peer review and accepted papers will be published in the conference proceeding (ISBN: 978-988-17012-9-9). The abstracts will be indexed and available at major academic databases. The accepted papers will also be considered for publication in the special issues of the journal Engineering Letters, in IAENG journals and in edited books.

    Calls for Manuscript Submissions

    Proposals for special conference sessions and tutorials deadline: 30 December, 2009

    Draft Paper Submission Deadline: 6 March, 2010

    Camera-Ready Papers Due & Registration Deadline: 31 March, 2010

    ICCIIS 2010: 30 June - 2 July, 2010

    The topics of the ICISIE'10 include, but not limited to, the following:

    Information Security:

    Modeling and Analysis of Information Security

    Protocols

    Logical Analysis

    Performance Analysis

    Risk Analysis

    Threat and Attacks in Information Security

    Passive Attacks

    Active Attacks

    Trojan Horses

    Viruses

    Worms

    Denial of Service

    Services of Information Security

    Authentication

    Access Control

    Secret Sharing

    Database Security

    Operating Systems Security

    Confidentiality

    Infrastructure for Information Security

    Information Security Standards

    Public Key Infrastructure

    Certification Authority

    Tools for Information Security

    Cryptography

    Cryptography algorithms

    Hardware Design and Implementation

    Simulation

    Performance Analysis

    Internet architecture design

    Internet search methods

    Optimization methods

    Security and protection

    Fault Tolerance

    Software Agents

    Web Java-based applications

    Knowledge-based web systems

    Multimedia web tools, architectures, and broadcasting

    Web data mining and database management

    Coding and compression

    Information retrieval

    Distance learning

    E-commerce applications

    E-business modeling and applications

    And other Internet applications and other web services applications


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.