Digital Forensics Surveillance Technology and Procedures in FGC
Digital Evidence Analytics in FGC
Digital Evidence Storage and Preservation in FGC
Digital Evidence visualization and communication for FGC
Forensic Procedures in FGC
Incident Response and Investigation in FGC
Network Forensics in FGC
Portable electronic Device Forensics for FGC
Network Traffic Analysis, Traceback and Attribution in FGC
Data Hiding and Recovery in FGC
Integrity of Digital Evidence and Live Investigation
Legal, Ethical and Policy issues related to Digital Forensics in FGC
Trends and Challenges for FGC
Multimedia Analysis in FGC
Forensics Case Studies in FGC
Evidence Protection in FGC
E-Governance Security
E-Bid
E-Archive
E-Health
E-Commerce
E-Invoice
E-Id
E-Notary
E-Justice
E-Voting
E-Passport
Virtual Wars and Countermeasures
Critical Information Infrastructure Protection
Risk Evaluation and Security Certification
Information Systems and Crime Analysis
Data Privacy
Privacy Enhancing Technologies
Privacy Foundations
Privacy Policies and Law
Privacy-Preserving Computing
Economics of Privacy
Electronic Healthcare Privacy
Natural Disasters and Emergencies, and Terrorism Protection
Privacy Theory and Engineering
Trust Formalization and Modeling
Risk Analysis, Modeling, and Management
Trust Management
Trustworthy Computing
Security Foundations
Trust Evaluation
Cryptology
Block Ciphers
Boolean Functions
Public Key Cryptography
Stream Ciphers
Elliptic Curve Cryptography
Quantum Cryptography
Homomorphic Encryption
Algebraic Curves in Cryptography
Zero Knowledge
Cryptographic Protocols
Cryptanalysis
Secret Sharing
Applications of Coding Theory in Cryptography
Hash Functions
RFID Security
Smart Card Applications and Security
Special Purpose Hardware for Attacking Cryptographic Systems
Cryptographic Hardware and Embedded Systems
Side Channel Analysis and Countermeasures
Efficient Software and Hardware Implementations
Key and Identity Management
Pairing Based Cryptography
Public Key Infrastructure
Certified Electronic Mail
Digital Signature
Standards
Certificates and Certificate Management
Trust Models
Protocols
Hardware / Software Applications
Key and Identity Management
Validity of Digital Signature in Government, Finance, and Commerce
Digital Signature Policies and Law
Responsibilities for Opponents to ESSP in Law in Digital Signature
Effects of Digital Signature on Digital Signature Law
Judgments related to Digital Signatures
Discrepancy between Digital Signatures
Digital Signature Law in Other Countries
Sectorial Applications
M-government Applications
E-government Applications
Applications for Banks and Finance Institutions
Applications of Electronic Signature Certificate Providers
GSM Operators
Information Security
Secure Multiparty Computation
Steganography
Computer Security
Biometric Approaches
Operating System Security
Mobile Communications Security
Network Security
Trusted Computing
Ad Hoc and Sensor Network Security
Wireless Security
Web Security
Peer to Peer Network Security
Database Security
E-mail Security
E-commerce Protocols
IPTV Security
Copyright protection
Content filtering and tracing
Security Weaknesses on Information Technologies
Distributed System Security
Penetration Tests
Secure Code Development
Malicious Codes
Intrusion Detection Systems
Viruses, Spyware, Spamware, Scam
Past Events
First International Symposium on Digital Forensics and Security 2013 - 20-21 May 2013, Firat University, Elazig, Turkey (36422)
Important
Please, check "International Symposium on Digital Forensics and Security" official website for possible changes, before making any traveling arrangements
Event Categories
Government & Global Issues: Law & Regulations
Technology: Computer Hardware, Imaging & Graphics, Information Technology (IT), IT Security, Signal Processing, Software & Applications, Software engineering