posted by user: gtsgtsgts || 14580 views || tracked by 17 users: [display]

ISC 2010 : Information Security Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security Conference
 
Link: http://math.fau.edu/~isc2010/index.html
 
When Oct 25, 2010 - Oct 28, 2010
Where Boca Raton
Submission Deadline Jun 29, 2010
Notification Due Aug 15, 2010
Final Version Due Aug 15, 2010
Categories    security   cryptography   networking   databases
 

Call For Papers


GENERAL INFORMATION

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), ISW 1999 in Malaysia (LNCS 1729), ISW 2000 in Australia (LNCS 1975) and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). The latest conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), and Chile (ISC'07, LNCS 4779), Taiwan (ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735)

Topics of Interest

The thirteenth Information Security Conference (ISC 2010) will be held in Boca Raton, Florida, USA. The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series. Topics of interest include, but are not limited to:



* access control
* accountability
* anonymity and pseudonymity
* applied cryptography
* authentication
* biometrics
* computer forensics
* cryptographic protocols
* database security
* data protection
* data/system integrity
* digital right management
* economics of security and privacy
* electronic frauds
* formal methods in security
* identity management
* information dissemination control
* information hiding and watermarking
* intrusion detection
* network security



* peer-to-peer security
* privacy
* secure group communications
* security and privacy in pervasive/ubiquitous computing
* security in information flow
* security in IT outsourcing
* security for mobile code
* secure cloud computing
* security of eCommerce, eBusiness and eGovernment
* security in location services
* security modeling and architectures
* security models for ambient intelligence environments
* security in social networks
* trust models and trust management policies
* embedded security


Related Resources

SPIE ICDIP 2026   SPIE--2026 The 18th International Conference on Digital Image Processing (ICDIP 2026)
Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
ACM ICBDT 2026   ACM--2026 8th International Conference on Big Data Technologies (ICBDT 2026)
CCCIoT 2026   7th International Conference on Cloud Computing and IoT
IJSPTM 2026   International Journal of Security, Privacy and Trust Management
ELELIJ 2026   Electrical and Electronics Engineering: An International Journal
ISC 2026   ISC High Performance 2026
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
FCSIT 2026   2026 5th Eurasian Conference on Frontiers of Computer Science and Information Technology (FCSIT 2026)
CoSIT 2026   13th International Conference on Computer Science and Information Technology