Login

 


Conference Topics

Contributions related, but not limited, to the following topics of interest are welcome:

Threat and attacks to information
Passive attacks, Access control
Accountability
Anonymity
Application security
Attacks and defenses
Authentication
Censorship and censorship-resistance
Distributed systems security
Embedded systems security
Forensics
Hardware security
Intrusion detection
Language-based security
Malware
Metrics
Network security
Privacy-preserving systems
Protocol security
Secure information flow Security and privacy policies
Security architectures
System security
Usability and security
Web security
active attacks, viruses,
Trojan horses, worms, denial of service
Authentication
Access Control
Confidentiality
Integrity
Non-Repudiation
Secret Sharing
Database Security
Operating Systems Security
Protocols And Its Logical Analysis
Performance Analysis
Risk Analysis
AES
IPSEC
Public Key Infrastructure
Certification Authority
Smart Cards
Biometrics
Watermarking
Intrusion Detection
Scanners
Mobile Agents
E-Commerce
E- Health Information Systems
Mobile Telephony
E-Banking, E-Voting
Entertainment Industry
Algorithms
Hardware Implementation
Simulation
Performance Analysis
Quantum Cryptography