Topics
- Multimedia Security
- Digital Rights Management
- Image, Audio and Video Encryption Mechanisms
- Multimedia Forensics
- Steganography and Digital Watermarking
- Privacy and Security in Surveillance Videos
- Security of VOIP and multimedia
- Intelligent Multimedia Security Services
- Information and Network Security
- Business Continuity & Disaster Recovery Planning
- Malwares
- Hacking and Defending
- Insider Threats
- Firewalls
- Intrusion Detection and Prevention
- High Performance Security Systems
- Network Security Policies: Implementation and Management
- Database and System Security
- SAN/NAS Security
- Internet Security & Applications
- Secure Operating Systems
- Web Security, Web Services and Enterprise Security
- Cambodian Studies
- Network Monitoring
- Access Controls and Security Mechanisms
- Security in Content Delivery Networks
- Secure Routing and Network Management
- Security in Optical Systems and Networks
- Security in High Speed Network
- Physical Security
- Cyber Security
- Security and Privacy Issues in Networks
- Ad Hoc Networks
- Mobile Networks
- Sensor Networks
- VANET Networks
- Social Networks
- P2P Networks
- Wireless Networks
- Satellite Networks
- Internet of Things
- E-Governance and E-commerce
- Cryptography and Algorithms
- Cryptographic Primitives and Security Protocols
- Cryptographic Algorithms, Hash Functions
- Key Distribution and Management
- Digital Signatures
- Privacy, Anonymity and Traceability
- Analysis of Security Protocols
- Provable Security
- Identity Management
- Secure System Implementation
- Cloud and Grid Security
- Security, Privacy and Cryptography in Clouds
- SaaS/PaaS/IaaS/AaaS Clouds
- Service-Oriented Architecture and Cloud Computing
- Mobile Cloud Architectures
- Programming Models and Systems/Tools
- Virtualization Trends & Challenges for Cloud Computing
- Green Cloud Computing & Economics of the Cloud
- Design Tool for Cloud Computing
- Quality of Service (QoS) in Cloud Computing
- Monitoring, Management and Maintenance of Clouds
- Performance Improvements for Cloud Computing
Who should Attend
Academics, industry professionals, scientists, researchers, policy makers and consultants.