IACSIT-2014 the 3rd International Conference on Security Science and Technology
View: 512
Website http://www.icsst.org/ |
Edit Freely
Category Security Science,Technology
Deadline: January 30, 2014 | Date: March 20, 2014-March 21, 2014
Venue/Country: Manila, Philippines
Updated: 2013-09-06 11:47:00 (GMT+9)
Call For Papers - CFP
IACSIT-2014 the 3rd International Conference on Security Science and Technology(ICSST 2014) March 20-21, 2014Manila, Philippineshttp://www.icsst.org/
Topics of interest include, but are not limited to:Access control and secure auditAnalysis of security protocolsAnonymity servicesAuthentication and AuthorizationAvionics and Automobile SoftwareBiometricsComputer ForensicsContent Production and Distribution Systems, Mobile and Multi-channel SystemsContext Awareness ComputingCritical Infrastructures ProtectionCryptographic primitivesCryptography and its ApplicationsData and Systems IntegrityDesign and Analysis of CryptosystemsElectronic Commerce SecurityElectronic payment systemsEnforcement of security policiesFormal Methods and Approaches to Manage and Control Complex SystemsFraud Control and Information HidingHuman Factors and Collaborative AspectsInformation and Security AssuranceIntegration of Heterogeneous TechnologiesIntellectual Property ProtectionInteroperability and StandardizationIntrusion Detection and ResponseKey Management and Key RecoveryLanguage-based securityMobile Communications SecurityNetwork SecurityPervasive and Ubiquitous ComputingPrivacy and identity managementPrivacy ProtectionReal-time and Embedded SystemsRisk Evaluation and Security CertificationSecure mobile codeSecure operating systemsSecurity and privacy in business servicesSecurity engineeringSecurity in ubiquitous computingSecurity ModelsSecurity ProtocolsSecurity requirements engineeringSecurity verificationSensor Network Systems and ApplicationsSmart CardsSoftware and System Development and Control Processes for Complex SystemsSoftware Architecture and System EngineeringSoftware Complexity VisualizationSoftware ProtectionSystems and Software Safety and SecurityTools, Environments, and Languages for Complex SystemsTrust ManagementUsable securityVerification Techniques for Complex Software SystemsVirtual Environments for Managing ComplexityVulnerability and threat analysisWatermarkingWeb Services Modeling and CompositionsAll accepted papers will be published in the volume of International Journal of Engineering and Technology(IJET) (ISSN; 1793-8244 (Online Version); 1793-8236 (Print Version)), and will be included in the Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library.Paper submissionPlease submit your papers by our online submission system.http://www.easychair.org/conferences/?conf=icsst2014
or by the Email Submissionicsst
iacsit.org
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.