NCS 2010 - The Second International Conference on Network and Communications Security (NCS 2010)
View: 2141
Website http://airccse.org/ncs2010/ncs.html |
Edit Freely
Category Communications Security
Deadline: May 20, 2010 | Date: December 27, 2010
Venue/Country: Chennai, India
Updated: 2010-06-04 19:32:22 (GMT+9)
Call For Papers - CFP
There is a shift away from the traditional client-server model to systems based on the peer-to peer network, which allows users share resources effectively. Also, due to increase in number of Internet applications & users, the security issues and pivotal challenges include integrity verification, authentication, and access control etc., are also increasing. As a consequence, the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential. The purpose of this conference is to publish latest & high-quality research works on Computer Networks & Communications security for wired and wireless networks in theoretical and practical aspects. This conference aims to promote state-of-the-art research in the area of computer Networks security. Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to Access control, Anonymity, Audit and audit reduction & Authentication and authorizationApplied cryptography, Cryptanalysis, Digital SignaturesBiometric securityBoundary control devicesCertification and accreditationCross-layer design for securitySecurity & Network ManagementData and system integrity, Database securityDefensive information warfareDenial of service protection, Intrusion Detection, Anti-malwareDistributed systems securityElectronic commerceE-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon ProtectionGrid securityInformation hiding and watermarking & Information survivabilityInsider threat protection, IntegrityIntellectual property protectionInternet/Intranet SecurityKey management and key recoveryLanguage-based securityMobile and wireless securityMobile, Ad Hoc and Sensor Network SecurityMonitoring and surveillanceMultimedia security ,Operating system security, Peer-to-peer securityPerformance Evaluations of Protocols & Security ApplicationPrivacy and data protectionProduct evaluation criteria and complianceRisk evaluation and security certificationRisk/vulnerability assessmentSecurity & Network ManagementSecurity Models & protocolsSecurity threats & countermeasures (DDoS, MiM, Session Hijacking,Replay attack etc,)Trusted computingUbiquitous Computing SecurityVirtualization security, VoIP security, Web 2.0 security
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.