会议名称(中文): 第11届安全与密码技术国际会议 会议名称(英文): 11th International Conference on Security and Cryptography (SECRYPT 2014) 所属学科: 应用数学,信息安全 开始日期: 2014-08-28 结束日期: 2014-08-30 所在国家: 奥地利 所在城市: 奥地利 具体地点: Vienna, Austria 主办单位: The Institute for Systems and Technologies of Information, Control and Communication (INSTICC)
[ 重要日期 ] 摘要截稿日期: 2014-04-15
[ 会务组联系方式 ] 联系电话: +351 265 520 185 传真: +44 203 014 8813 E-MAIL: secrypt.secretariat@insticc.org 会议网站: http://www.secrypt.icete.org/ 会议背景介绍: SECRYPT is an annual international conference covering research in information and communication security. The 11th International Conference on Security and Cryptography (SECRYPT 2014) will be held in Vienna, Austria on 28-30 August 2014.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. 征文范围及要求: CONFERENCE TOPICS Access Control Applied Cryptography Biometrics Security and Privacy Critical Infrastructure Protection Data Integrity Data Protection Database Security and Privacy Digital Forensics Digital Rights Management Ethical and Legal Implications of Security and Privacy Formal Methods for Security Human Factors and Human Behavior Recognition Techniques Identification, Authentication and Non-repudiation Identity Management Information Hiding Information Systems Auditing Insider Threats and Countermeasures Intellectual Property Protection Intrusion Detection & Prevention Management of Computing Security Network Security Organizational Security Policies Peer-to-Peer Security Personal Data Protection for Information Systems Privacy Privacy Enhancing Technologies Reliability and Dependability Risk Assessment Secure Software Development Methodologies Security and Privacy for Big Data Security and privacy in Complex Systems Security and Privacy in Crowdsourcing Security and Privacy in IT Outsourcing Security and Privacy in Location-based Services Security and Privacy in Mobile Systems Security and Privacy in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grids Security and Privacy in Social Networks Security and Privacy in the Cloud Security and Privacy in Web Services Security and Privacy Policies Security Area Control Security Deployment Security Engineering Security in Distributed Systems Security Information Systems Architecture Security Management Security Metrics and Measurement Security Protocols Security requirements Security Verification and Validation Sensor and Mobile Ad Hoc Network Security Service and Systems Design and QoS Network Security Software Security Trust management and Reputation Systems Ubiquitous Computing Security Wireless Network Security
|