AIRCC Publishing Corporation

www.airccse.org

Third International Conference on Cryptography and Information Security (CRIS 2017) January 3, 2017

Filed under: Uncategorized — AIRCC INTERNATIONAL JOURNALS - CONFERENCES @ 12:14 pm

http://cosit2016.org/2017/cris2017/index.html

March 25 ~ 26, 2017, Geneva, Switzerland

Call for papers

Third International Conference on Cryptography and Information Security (CRIS 2017) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in applied cryptography and Information security.

Topics of interest include, but are not limited to, the following:

  • Cryptographic Protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and Authentication
  • Key Management
  • Trust Management
  • Quantum Cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological and Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement and Unsupervised Learning
  • Autonomy-Oriented Computing
  • Co-evolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust Models and Metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Wireless Network Security
  • Information Hiding
  • E- Commerce
  • Data and System Integrity
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service, Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission

Authors are invited to submit papers through the Conference Submission System by January 14, 2017. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS&IT) series (Confirmed).

Selected papers from CRIS 2017, after further revisions, will be published in the special issue of the following journals.

o    International Journal on Cryptography and Information Security (IJCIS)

o    International Journal of Network Security & Its Applications (IJNSA)

o    International Journal of Wireless & Mobile Networks (IJWMN) – ERA Indexed

o    International Journal of Security, Privacy and Trust Management (IJSPTM)

Important Dates

  • Submission Deadline  : January 14, 2017
  • Authors Notification  : February 05, 2017
  • Final Manuscript Due : February 15, 2017

 

Advertisements
 

Thanks for your valuable comments

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s