Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      
2nd Int. Conf. on  Information and Network Security

2nd Int. Conf. on Information and Network Security

ICINS

Date of beginning

Wednesday, 29 July 2015

Duration

2 days

Deadline for abstracts

Friday, 15 May 2015

City

Shanghai

Country

China

Contact

Ms. Yashin Tu

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

0

Participants

0

Memo

Publication:

All accepted papers will be selected and published in One of the following Journals.

-- WIT Transactions on Information and Communication Technologies (ISSN: 1743-3517)

Indexed by EI Compendex, Scopus and ISI._____

-- International Journal of Communications (JCM, 1796-2021)

Indexed by Scopus and EI Compendex__________



Topics:

Security of Web-based applications and services_____

Anti-malware techniques: detection, analysis, and prevention_____

Intrusion prevention, detection, and response_____

Security for electronic voting_____

Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques_____

Privacy and anonymity technologies_____

Network perimeter controls: firewalls, packet filters, and application gateways_____

Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems_____

Security for Vehicular Ad-hoc Networks (VANETs)_____

Security for peer-to-peer and overlay network systems_____

Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing_____

Implementation, deployment and management of network security policies_____

Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management_____

Integrating security services with system and application security facilities and protocols_____

Public key infrastructures, key management, certification, and revocation_____

Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost_____

Security for collaborative applications: teleconferencing and video-conferencing_____

Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)

Security for large-scale systems and critical infrastructures_____

Integrating security in Internet protocols: routing, naming, network management_____

For more topics: http://www.icins.org/cfp.html__________



Submission method:

Electronic Submission System; ( .pdf)

http://www.easychair.org/conferences/?conf=icins2015