First International Symposium on Digital Forensics and Security 2013

  • 20-21 May 2013
  • Firat University, Elazig, Turkey

Description

Topics
  • Cyber Security and Defense
    • Cyber Warfare
    • Espionage
    • Critical Infrastructures
    • Social Networks
    • Threats
    • Cloud Computing
    • Strategies and Policies
    • Practices and Solutions
    • Standards
    • Laws
    • International Collaboration
  • Information Forensics and Security
    • Signal Processing in the Encrypted Domain
    • Digital Forensics
    • Digital Evidence Management in FGC
    • Digital Forensics Tools in FGC
    • Digital Forensics Surveillance Technology and Procedures in FGC
    • Digital Evidence Analytics in FGC
    • Digital Evidence Storage and Preservation in FGC
    • Digital Evidence visualization and communication for FGC
    • Forensic Procedures in FGC
    • Incident Response and Investigation in FGC
    • Network Forensics in FGC
    • Portable electronic Device Forensics for FGC
    • Network Traffic Analysis, Traceback and Attribution in FGC
    • Data Hiding and Recovery in FGC
    • Integrity of Digital Evidence and Live Investigation
    • Legal, Ethical and Policy issues related to Digital Forensics in FGC
    • Trends and Challenges for FGC
    • Multimedia Analysis in FGC
    • Forensics Case Studies in FGC
    • Evidence Protection in FGC
  • E-Governance Security
    • E-Bid
    • E-Archive
    • E-Health
    • E-Commerce
    • E-Invoice
    • E-Id
    • E-Notary
    • E-Justice
    • E-Voting
    • E-Passport
    • Virtual Wars and Countermeasures
    • Critical Information Infrastructure Protection
    • Risk Evaluation and Security Certification
    • Information Systems and Crime Analysis
  • Data Privacy
    • Privacy Enhancing Technologies
    • Privacy Foundations
    • Privacy Policies and Law
    • Privacy-Preserving Computing
    • Economics of Privacy
    • Electronic Healthcare Privacy
    • Natural Disasters and Emergencies, and Terrorism Protection
    • Privacy Theory and Engineering
    • Trust Formalization and Modeling
    • Risk Analysis, Modeling, and Management
    • Trust Management
    • Trustworthy Computing
    • Security Foundations
    • Trust Evaluation
  • Cryptology
    • Block Ciphers
    • Boolean Functions
    • Public Key Cryptography
    • Stream Ciphers
    • Elliptic Curve Cryptography
    • Quantum Cryptography
    • Homomorphic Encryption
    • Algebraic Curves in Cryptography
    • Zero Knowledge
    • Cryptographic Protocols
    • Cryptanalysis
    • Secret Sharing
    • Applications of Coding Theory in Cryptography
    • Hash Functions
    • RFID Security
    • Smart Card Applications and Security
    • Special Purpose Hardware for Attacking Cryptographic Systems
    • Cryptographic Hardware and Embedded Systems
    • Side Channel Analysis and Countermeasures
    • Efficient Software and Hardware Implementations
    • Key and Identity Management
    • Pairing Based Cryptography
  • Public Key Infrastructure
    • Certified Electronic Mail
    • Digital Signature
    • Standards
    • Certificates and Certificate Management
    • Trust Models
    • Protocols
    • Hardware / Software Applications
    • Key and Identity Management
    • Validity of Digital Signature in Government, Finance, and Commerce
    • Digital Signature Policies and Law
    • Responsibilities for Opponents to ESSP in Law in Digital Signature
    • Effects of Digital Signature on Digital Signature Law
    • Judgments related to Digital Signatures
    • Discrepancy between Digital Signatures
    • Digital Signature Law in Other Countries
  • Sectorial Applications
    • M-government Applications
    • E-government Applications
    • Applications for Banks and Finance Institutions
    • Applications of Electronic Signature Certificate Providers
    • GSM Operators
  • Information Security
    • Secure Multiparty Computation
    • Steganography
    • Computer Security
    • Biometric Approaches
    • Operating System Security
    • Mobile Communications Security
    • Network Security
    • Trusted Computing
    • Ad Hoc and Sensor Network Security
    • Wireless Security
    • Web Security
    • Peer to Peer Network Security
    • Database Security
    • E-mail Security
    • E-commerce Protocols
    • IPTV Security
    • Copyright protection
    • Content filtering and tracing
    • Security Weaknesses on Information Technologies
    • Distributed System Security
    • Penetration Tests
    • Secure Code Development
    • Malicious Codes
    • Intrusion Detection Systems
    • Viruses, Spyware, Spamware, Scam

Past Events

Important

Please, check "International Symposium on Digital Forensics and Security" official website for possible changes, before making any traveling arrangements

Event Categories

Government & Global Issues: Law & Regulations
Technology: Computer Hardware, Imaging & Graphics, Information Technology (IT), IT Security, Signal Processing, Software & Applications, Software engineering

Other Events with Similar Categories

Other Events with Similar Location or Organizer

Featured Conferences & Exhibitions