MAY 23

Fourth International Conference on Cryptography and Information Security

CRYPIS 2015   

Conference CFP

  

 

When:

  23 May 2015 through 24 May 2015

CFP Deadline:

  22 Apr 2015

Where:

  Sydney, Australia

Website URL:

  http://ccsit2015.org/cryips2015/index.html

Categories:

  Engineering & Technology > Computer/Informatics

Cloud tags:

Event description:

Fourth International Conference on Cryptography and Information Security (CRYPIS 2015)


May 23 ~ 24 , 2015 , Sydney , Australia


Call for Papers


This Conference focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.


Topics of interest include, but are not limited to the following:


  • Cryptographic protocols
  • Intrusion Detection and Vulnerability Assessment
  • Cryptography and Coding Untraceability
  • Authentication and Non-repudiation
  • Untraceability
  • Identification and Authentication
  • Key management
  • Insider Threats and Countermeasures
  • Authentication
  • Intrusion Detection & Prevention
  • Trust Management
  • Secure Cloud Computing
  • Quantum cryptography
  • Security Information Systems Architecture and Design and Security Patterns
  • Computational Intelligence in Security
  • Security Management
  • Artificial Immune Systems
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Biological & Evolutionary Computation
  • Sensor and Mobile Ad Hoc Network Security
  • Intelligent Information & Database Systems
  • Service and Systems Design and QoS Network Security
  • Intelligent Agents and Systems
  • Software Security
  • Reinforcement & Unsupervised Learning
  • Security and Privacy in Mobile Systems
  • Autonomy-Oriented Computing
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Coevolutionary Algorithms
  • Security and Privacy in Web Sevices
  • Fuzzy Systems
  • Security and Privacy Policies
  • Biometric Security
  • Security Area Control
  • Trust models and metrics
  • Security Deployment
  • Regulation and Trust Mechanisms
  • Security Engineering
  • Data Integrity
  • Security for Grid Computing
  • Models for Authentication, Trust and Authorization
  • Security in Distributed Systems
  • Access Control and Intrusion Detection

  • Paper Submission


    Authors are invited to submit papers through the Conference Submission System by April 22, 2015. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & InformationTechnology (CS & IT) series (Confirmed).

    Selected papers from CRYPIS-2015, after further revisions, will be published in an International Journal (Approval Pending).


    Important Dates :






    Submission Deadline:April 22, 2015 (firm)
    Paper Status Notification:May 10, 2015
    Final Manuscript Due:May 15, 2015

    Co - Located Event :



    Posting date:

    19 May 2015
    views | 1 subscribers | Be the first to rate this event

    Placement:

    Not-featured (How do I make my event featured?)