会议名称(中文): 第十届信息安全实践国际会议 会议名称(英文): 10th Information Security Practice and Experience Conference (ISPEC) 所属学科: 计算机科学理论,计算机系统结构与硬件,计算机软件,计算机应用技术,计算机网络,信息安全,人工智能 开始日期: 2014-05-12 结束日期: 2014-05-14 所在国家: 中华人民共和国 所在城市: 福建省 福州市 主办单位: 福建省网络安全与密码技术重点实验室 议题: 信息安全 [ 组织结构 ] 会议主席: Robert Deng; Li Xu 程序委员会主席: Xinyi Huang; Jianying Zhou 会议嘉宾: 姓名 职务 简介 演讲题目 [ 重要日期 ] 摘要截稿日期: 2013-12-02 全文截稿日期: 2013-12-02
[ 会务组联系方式 ] 联系人: 黄欣沂 联系电话: 15396018946 E-MAIL: ispec2014@easychair.org 通讯地址: 福建省福州市福建师范大学数学与计算机科学学院 邮政编码: 350007 会议注册费: 会议网站: http://icsd.i2r.a-star.edu.sg/ispec2014/ 会议背景介绍: The 10th International Conference on Information Security Practice and Experience (ISPEC 2014) will be held in Fuzhou, China, May 12-14, 2014, and hosted by Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University (FNU), China.
The ISPEC conference series is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. In previous years, ISPEC has taken place in Singapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008), Xi'an, China (2009), Seoul, Korea (2010), Guangzhou, China (2011), Hangzhou, China (2012), and Lanzhou, China (2013). 征文范围及要求: Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to:
- Access control - Applied cryptography - Availability, resilience, and usability - Cloud security - Cryptanalysis - Database security - Digital rights management - Embedded system security - Information security in vertical applications - Multimedia security - Network security - Privacy and anonymity - Risk evaluation and security certification - Security for cyber-physical systems - Security intelligence - Security of smart cards and RFID systems - Security policies - Security protocols - Security systems - Smart grid security - Smartphone security - Trust model and management - Trusted computing
|