Beruflich Dokumente
Kultur Dokumente
Cryptographic protocols
Cryptography and Coding
Untraceability
Privacy and authentication
Key management
Authentication
Trust Management
Quantum cryptography
Computational Intelligence in Security
Artificial Immune Systems
Biological & Evolutionary Computation
Intelligent Agents and Systems
Reinforcement & Unsupervised
Learning
Autonomy-Oriented Computing
Coevolutionary Algorithms
Fuzzy Systems
Biometric Security
Trust models and metrics
Regulation and Trust Mechanisms
Data Integrity
Models for Authentication, Trust and
Authorization
Wireless Network Security
Information Hiding
E- Commerce
Data & System Integrity
Access Control and Intrusion Detection
Intrusion Detection and Vulnerability
Assessment
Paper Submission
Authors are invited to submit Papers through the Conference Submission System by February 10, 2015.
Submissions must be original and should not have been published previously or be under consideration
for publication while being evaluated for this conference. The proceedings of the conference will be
published byComputer Science Conference Proceedings in Computer Science & Information
Technology (CS&IT) series (Confirmed).
Selected Papers from CRIS 2015, after further revisions, will be published in the special issue of the
following journals
Important Dates