The Global Premier International Conference on Cryptography and Security (ICCS 2015) is dedicated to cryptography, data security, network security, encryption technologies and watermarking.
Topics
- Applied Cryptography
- Access Control
- Critical Infrastructure Protection
- Biometrics Security and Privacy
- Data Protection
- Data Integrity
- Digital Forensics
- Database Security and Privacy
- Ethical and Legal Implications of Security and Privacy
- Digital Rights Management
- Human Factors and Human Behavior Recognition Techniques
- Formal Methods for Security
- Identity Management
- Identification, Authentication and Non-repudiation
- Information Systems Auditing
- Information Hiding
- Intellectual Property Protection
- Insider Threats and Countermeasures
- Management of Computing Security
- Intrusion Detection & Prevention
- Organizational Security Policies
- Network Security
- Personal Data Protection for Information Systems
- Peer-to-Peer Security
- Privacy Enhancing Technologies
- Privacy
- Risk Assessment
- Reliability and Dependability
- Security and Privacy in Complex Systems
- Secure Software Development Methodologies
- Security and Privacy in IT Outsourcing
- Security and Privacy in Crowdsourcing
- Security and Privacy in Mobile Systems
- Security and Privacy in Location-based Services
- Security and Privacy in Smart Grids
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in the Cloud
- Security and Privacy in Social Networks
- Security and Privacy Policies
- Security and Privacy in Web Services
- Security Deployment
- Security Area Control
- Security in Distributed Systems
- Security Engineering
- Security Management
- Security Information Systems Architecture
- Security Protocols
- Security Metrics and Measurement
- Security Verification and Validation
- Security requirements
- Service and Systems Design and QoS Network Security
- Sensor and Mobile Ad Hoc Network Security
- Trust management and Reputation Systems
- Software Security
- Wireless Network Security
- Ubiquitous Computing Security
Who should Attend
- Researchers
- Students
- Engineers
- Mathematicians
- Practitioners