Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      
3rd Int. Conf. on Security Science and Technology

3rd Int. Conf. on Security Science and Technology

ICSST

Date of beginning

Thursday, 20 March 2014

Duration

2 days

Deadline for abstracts

Monday, 30 December 2013

City

Manila

Country

Philippines

Contact

Ms. Kiki Huang

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

0

Participants

0

Memo

【Call for Paper】:

Access control and secure audit_____

Analysis of security protocols_____

Anonymity services_____

Authentication and Authorization_____

Avionics and Automobile Software_____

Biometrics_____

Computer Forensics_____

Content Production and Distribution Systems, Mobile and Multi-channel Systems_____

Context Awareness Computing_____

Critical Infrastructures Protection_____

Cryptographic primitives_____

Cryptography and its Applications_____

Data and Systems Integrity_____

Design and Analysis of Cryptosystems_____

Electronic Commerce Security_____

Electronic payment systems_____

Enforcement of security policies_____

Formal Methods and Approaches to Manage and Control Complex Systems_____

Fraud Control and Information Hiding_____

Human Factors and Collaborative Aspects_____

Information and Security Assurance_____

Integration of Heterogeneous Technologies_____

Intellectual Property Protection_____

Interoperability and Standardization_____

Intrusion Detection and Response_____

Key Management and Key Recovery_____

Language-based security_____

Mobile Communications Security_____

Network Security_____

Pervasive and Ubiquitous Computing_____

Privacy and identity management_____

Privacy Protection_____

Real-time and Embedded Systems_____

Risk Evaluation and Security Certification_____

Secure mobile code_____

Secure operating systems_____

Security and privacy in business services_____

Security engineering_____

Security in ubiquitous computing_____

Security Models_____

Security Protocols_____

Security requirements engineering_____

Security verification_____

Sensor Network Systems and Applications_____

Smart Cards******

Software and System Development and Control Processes for Complex Systems_____

Software Architecture and System Engineering_____

Software Complexity Visualization_____

Software Protection_____

Systems and Software Safety and Security_____

Tools, Environments, and Languages for Complex Systems_____

Trust Management_____

Usable security******

Verification Techniques for Complex Software Systems_____

Virtual Environments for Managing Complexity_____

Vulnerability and threat analysis_____

Watermarking_____

Web Services Modeling and Compositions_____



【Publication】:

All accepted papers will be published in the volume of International Journal of Engineering and Technology(IJET) (ISSN; 1793-8244 (Online Version); 1793-8236 (Print Version)), and will be included in the Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library._____





【Paper Submission】:

1.Please submit your papers by our online submission system:

http://www.easychair.org/conferences/?conf=icsst2014_____

2.By the Email Submission:

This email address is being protected from spambots. You need JavaScript enabled to view it.