Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors


    NCS 2010 - The Second International Conference on Network and Communications Security (NCS 2010)

    View: 2142

    Website http://airccse.org/ncs2010/ncs.html | Want to Edit it Edit Freely

    Category Communications Security

    Deadline: May 20, 2010 | Date: December 27, 2010

    Venue/Country: Chennai, India

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    There is a shift away from the traditional client-server model to systems based on the peer-to peer network, which allows users share resources effectively. Also, due to increase in number of Internet applications & users, the security issues and pivotal challenges include integrity verification, authentication, and access control etc., are also increasing. As a consequence, the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential.

    The purpose of this conference is to publish latest & high-quality research works on Computer Networks & Communications security for wired and wireless networks in theoretical and practical aspects. This conference aims to promote state-of-the-art research in the area of computer Networks security.

    Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

    Access control, Anonymity, Audit and audit reduction & Authentication and authorization

    Applied cryptography, Cryptanalysis, Digital Signatures

    Biometric security

    Boundary control devices

    Certification and accreditation

    Cross-layer design for security

    Security & Network Management

    Data and system integrity, Database security

    Defensive information warfare

    Denial of service protection, Intrusion Detection, Anti-malware

    Distributed systems security

    Electronic commerce

    E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection

    Grid security

    Information hiding and watermarking & Information survivability

    Insider threat protection, Integrity

    Intellectual property protection

    Internet/Intranet Security

    Key management and key recovery

    Language-based security

    Mobile and wireless security

    Mobile, Ad Hoc and Sensor Network Security

    Monitoring and surveillance

    Multimedia security ,Operating system security, Peer-to-peer security

    Performance Evaluations of Protocols & Security Application

    Privacy and data protection

    Product evaluation criteria and compliance

    Risk evaluation and security certification

    Risk/vulnerability assessment

    Security & Network Management

    Security Models & protocols

    Security threats & countermeasures (DDoS, MiM, Session Hijacking,Replay attack etc,)

    Trusted computing

    Ubiquitous Computing Security

    Virtualization security, VoIP security, Web 2.0 security


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.