| |||||||||||||||
ICSST 2011 : 2011 International Conference on Security Science and Technology | |||||||||||||||
Link: http://www.icsst.org/cfp.htm | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
2011 International Conference on Security Science and Technology (ICSST 2011) is the premier forum for the presentation of new advances and research results in the fields of theoretical, experimental, and applied Security Science and Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to:
Access control and secure audit Analysis of security protocols Anonymity services Authentication and Authorization Avionics and Automobile Software Biometrics Computer Forensics Content Production and Distribution Systems, Mobile and Multi-channel Systems Context Awareness Computing Critical Infrastructures Protection Cryptographic primitives Cryptography and its Applications Data and Systems Integrity Design and Analysis of Cryptosystems Electronic Commerce Security Electronic payment systems Enforcement of security policies Formal Methods and Approaches to Manage and Control Complex Systems Fraud Control and Information Hiding Human Factors and Collaborative Aspects Information and Security Assurance Integration of Heterogeneous Technologies Intellectual Property Protection Interoperability and Standardization Intrusion Detection and Response Key Management and Key Recovery Language-based security Mobile Communications Security Network Security Pervasive and Ubiquitous Computing Privacy and identity management Privacy Protection Real-time and Embedded Systems Risk Evaluation and Security Certification Secure mobile code Secure operating systems Security and privacy in business services Security engineering Security in ubiquitous computing Security Models Security Protocols Security requirements engineering Security verification Sensor Network Systems and Applications Smart Cards Software and System Development and Control Processes for Complex Systems Software Architecture and System Engineering Software Complexity Visualization Software Protection Systems and Software Safety and Security Tools, Environments, and Languages for Complex Systems Trust Management Usable security Verification Techniques for Complex Software Systems Virtual Environments for Managing Complexity Vulnerability and threat analysis Watermarking Web Services Modeling and Compositions The ICSST 2011 conference proceeding will be published by IEEE, which will be included in the IEEE Xplore, and indexed by the Ei Compendex, ISI Proceeding and other indexing services. |
|