Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ICSST 2011 - 2011 International Conference on Security Science and Technology

    View: 1469

    Website http://www.icsst.org/cfp.htm | Want to Edit it Edit Freely

    Category Security Scienceļ¼› Security Technology

    Deadline: September 10, 2010 | Date: January 21, 2011-January 23, 2011

    Venue/Country: Chongqing, China

    Updated: 2010-06-30 15:31:37 (GMT+9)

    Call For Papers - CFP

    2011 International Conference on Security Science and Technology (ICSST 2011) is the premier forum for the presentation of new advances and research results in the fields of theoretical, experimental, and applied Security Science and Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to:

    Access control and secure audit

    Analysis of security protocols

    Anonymity services

    Authentication and Authorization

    Avionics and Automobile Software

    Biometrics

    Computer Forensics

    Content Production and Distribution Systems, Mobile and Multi-channel Systems

    Context Awareness Computing

    Critical Infrastructures Protection

    Cryptographic primitives

    Cryptography and its Applications

    Data and Systems Integrity

    Design and Analysis of Cryptosystems

    Electronic Commerce Security

    Electronic payment systems

    Enforcement of security policies

    Formal Methods and Approaches to Manage and Control Complex Systems

    Fraud Control and Information Hiding

    Human Factors and Collaborative Aspects

    Information and Security Assurance

    Integration of Heterogeneous Technologies

    Intellectual Property Protection

    Interoperability and Standardization

    Intrusion Detection and Response

    Key Management and Key Recovery

    Language-based security

    Mobile Communications Security

    Network Security

    Pervasive and Ubiquitous Computing

    Privacy and identity management

    Privacy Protection

    Real-time and Embedded Systems

    Risk Evaluation and Security Certification

    Secure mobile code

    Secure operating systems

    Security and privacy in business services

    Security engineering

    Security in ubiquitous computing

    Security Models

    Security Protocols

    Security requirements engineering

    Security verification

    Sensor Network Systems and Applications

    Smart Cards

    Software and System Development and Control Processes for Complex Systems

    Software Architecture and System Engineering

    Software Complexity Visualization

    Software Protection

    Systems and Software Safety and Security

    Tools, Environments, and Languages for Complex Systems

    Trust Management

    Usable security

    Verification Techniques for Complex Software Systems

    Virtual Environments for Managing Complexity

    Vulnerability and threat analysis

    Watermarking

    Web Services Modeling and Compositions

    The ICSST 2011 conference proceeding will be published by IEEE, which will be included in the IEEE Xplore, and indexed by the Ei Compendex, ISI Proceeding and other indexing services.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.