【Call for Paper】:
Access control and secure audit_____
Analysis of security protocols_____
Anonymity services_____
Authentication and Authorization_____
Avionics and Automobile Software_____
Biometrics_____
Computer Forensics_____
Content Production and Distribution Systems, Mobile and Multi-channel Systems_____
Context Awareness Computing_____
Critical Infrastructures Protection_____
Cryptographic primitives_____
Cryptography and its Applications_____
Data and Systems Integrity_____
Design and Analysis of Cryptosystems_____
Electronic Commerce Security_____
Electronic payment systems_____
Enforcement of security policies_____
Formal Methods and Approaches to Manage and Control Complex Systems_____
Fraud Control and Information Hiding_____
Human Factors and Collaborative Aspects_____
Information and Security Assurance_____
Integration of Heterogeneous Technologies_____
Intellectual Property Protection_____
Interoperability and Standardization_____
Intrusion Detection and Response_____
Key Management and Key Recovery_____
Language-based security_____
Mobile Communications Security_____
Network Security_____
Pervasive and Ubiquitous Computing_____
Privacy and identity management_____
Privacy Protection_____
Real-time and Embedded Systems_____
Risk Evaluation and Security Certification_____
Secure mobile code_____
Secure operating systems_____
Security and privacy in business services_____
Security engineering_____
Security in ubiquitous computing_____
Security Models_____
Security Protocols_____
Security requirements engineering_____
Security verification_____
Sensor Network Systems and Applications_____
Smart Cards******
Software and System Development and Control Processes for Complex Systems_____
Software Architecture and System Engineering_____
Software Complexity Visualization_____
Software Protection_____
Systems and Software Safety and Security_____
Tools, Environments, and Languages for Complex Systems_____
Trust Management_____
Usable security******
Verification Techniques for Complex Software Systems_____
Virtual Environments for Managing Complexity_____
Vulnerability and threat analysis_____
Watermarking_____
Web Services Modeling and Compositions_____
【Publication】:
All accepted papers will be published in the volume of International Journal of Engineering and Technology(IJET) (ISSN; 1793-8244 (Online Version); 1793-8236 (Print Version)), and will be included in the Engineering & Technology Digital Library, Google Scholar, Ulrich Periodicals Directory, Crossref, ProQuest, Electronic Journals Library._____
【Paper Submission】:
1.Please submit your papers by our online submission system:
http://www.easychair.org/conferences/?conf=icsst2014_____
2.By the Email Submission:
This email address is being protected from spambots. You need JavaScript enabled to view it.