Sie sind auf Seite 1von 3

Fourth International Conference on Cryptography and Information security

(CRYPIS-2015)
May 23~24,Sydney 2015
http://ccsit2015.org/cryips2015/index.html

Scope & Topics

Fourth International Conference on Crptography and Information security(CRYPIS 2015) focuses on


cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,
researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and
Information security.

Topics of interest include, but are not limited to the following

Cryptographic protocols
Cryptography and Coding
Untraceability
Privacy and authentication
Key management
Authentication
Trust Management
Quantum cryptography
Computational Intelligence in
Security
Artificial Immune Systems
Biological & Evolutionary
Computation
Intelligent Agents and Systems
Reinforcement & Unsupervised
Learning
Autonomy-Oriented Computing
Coevolutionary Algorithms
Fuzzy Systems
Biometric Security
Trust models and metrics
Regulation and Trust
Mechanisms
Data Integrity
Models for Authentication,
Trust and Authorization
Access Control and Intrusion

Intrusion Detection and Vulnerability


Assessment
Authentication and Non-repudiation
Identification and Authentication
Insider Threats and Countermeasures
Intrusion Detection & Prevention
Secure Cloud Computing
Security Information Systems Architecture
and Design and Security Patterns
Security Management
Security Requirements (threats,
vulnerabilities, risk, formal methods, etc.)
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS
Network Security
Software Security
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous
Computing
Security and Privacy in Web Sevices
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security for Grid Computing
Security in Distributed Systems

Detection

Paper Submission

Authors are invited to submit papers through the conference Submission system by February 08, 2015.
Submissions must be original and should not have been published previously or be under consideration
for publication while being evaluated for this conference. The proceedings of the conference will be
published by Proceedings in Computer Science & Information Technology (CS & IT) series
(Confirmed).

Selected papers from CRYPIS-2015, after further revisions, will be published in an International
Journal (Approval Pending).

International Journal of Network Security & Its Applications ( IJNSA )


International Journal On Cryptography And Information Security ( IJCIS )
International Journal of Security, Privacy and Trust Management( IJSPTM )

Important Dates

Submission Deadline : February 08, 2015


Authors Notification : April 08, 2015
Final Manuscript Due : April 15, 2015

Das könnte Ihnen auch gefallen