Fifth International Conference on Cryptographyand Information Security (CRYPIS 2014)


Fifth International Conference on Cryptographyand  Information Security
(CRYPIS 2014)

http://wimo2014.org/cryp/index.html

July 12~13, Sydney, Australia

Call for Papers

This Conference focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Topics of interest include, but are not limited to the following:

  • Cryptographic protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Coevolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission

Authors are invited to submit papers through the conference Submission system ( Track:CRYPIS 2014 ) by April 01, 2014. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Proceedings in Computer Science & Information Technology(CS&IT) series(Confirmed).

Selected papers from CRYPIS-2014, after further revisions, will be published in an International Journal (Approval Pending).

Important Dates:

  • Submission Deadline : April 01, 2014
  • Authors Notification: June 05, 2014
  • Final Manuscript Due : June 12, 2014
Advertisements

The Sixth International Conference on Wireless, Mobile Network & Applications (WiMoA 2014)


http://aicty.org/2014/wimoa14/index.html

July 26~27, 2014, Chennai

Call for Papers

 

The Sixth International Conference on Wireless, Mobile Network & Applications (WiMoA 2014) is dedicated to address the challenges in the areas of wireless, mobile network issues & its applications. The Conference looks for significant contributions to the Wireless & Mobile computing in theoretical and practical aspects. The Wireless & Mobile computing domain emerges from the integration among personal computing, networks, communication technologies, cellular technology and the Internet Technology. The modern applications are emerging in the area of mobile ad hoc networks and sensor networks. This Conference is intended to cover contributions in both the design and analysis in the context of mobile, wireless, ad-hoc, and sensor networks. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & Mobile computing concepts and establishing new collaborations in these areas.

Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

Topics of Interest:

  • Algorithms and modeling for tracking and locating mobile users
  • Architectures, protocols, and algorithms to cope with mobile & wireless Networks
  • Broadband access networks
  • Complexity analysis of algorithms for mobile environments
  • Cryptography, security and privacy of mobile & wireless networks
  • Data management on mobile and wireless computing
  • Distributed algorithms of mobile computing
  • Energy saving protocols for ad hoc and sensor networks
  • Information access in wireless networks
  • Integration of wired and wireless networks
  • Integration of wired and wireless systems
  • Mobile ad hoc and sensor networks
  • Mobile applications, location-dependent and sensitive applications
  • Nomadic computing, applications and services supporting the mobile user
  • OS and middleware support for mobile computing and networking
  • Performance of mobile and wireless networks and systems
  • Recent trends in mobile and wireless applications
  • Resource management in mobile, wireless and ad-hoc networks
  • Routing, and communication primitives in ad hoc and sensor networks
  • Satellite communications
  • Service creation and management environments for mobile/wireless systems
  • Synchronization and scheduling issues in mobile and ad hoc networks
  • Wireless & Mobile Issues related to OS
  • wireless multimedia systems

Paper Submission

Authors are invited to submit papers for the conference Submission system (Easy chair) by 25 April, 2014. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Springer (Confirmed). Selected papers from WiMoA – 2014, after further revisions, will be published in the special issues of the following international journals.

International Journal of Wireless & Mobile Networks (IJWMN)

International journal of Computer Networks & Communications (IJCNC)

International journal of Network Security & Its Applications (IJNSA)

International journal of computer science & information Technology (IJCSIT)

International Journal of Database Management Systems ( IJDMS )

Computer Science & Engineering: An International Journal (CSEIJ)

Important Dates

 

Submission Deadlines : 25 April, 2014

Paper Status Notification : 15 June, 2014

Final Manuscript Due : 20 June, 2014