Abbrevation
ICCS
City
Bangkok
Country
Thailand
Deadline Paper
Start Date
End Date
Abstract

<p style="text&#8211;align:justify">The purpose of ICCS 2014, the International Conference on Cryptography and Security, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication&#046;</p> <p style="text&#8211;align:justify">Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing&#046; In addition to the mathematical theory and practice of cryptography and coding, ICCS also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e&#8211;business, internet and global enterprises&#046;</p> <p style="text&#8211;align:justify">Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics&#046;</p> <p style="text&#8211;align:justify">Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&amp;D projects, engineering or business applications, are welcome&#046; Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged&#046; Papers describing original work are invited in any of the areas listed below&#046; Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of ICCS 2014, with an ISBN&#046; Acceptance will be based on quality, relevance and originality&#046; Both full research reports and work&#8211;in&#8211;progress reports are welcome&#046; There will be both oral and virtual sessions&#046;</p><p style="text&#8211;align:justify"><br></p><p style="text&#8211;align:justify"><br>Conference Topics<br>Access Control<br>Applied Cryptography<br>Biometrics Security and Privacy<br>Critical Infrastructure Protection<br>Data Integrity<br>Data Protection<br>Database Security and Privacy<br>Digital Forensics<br>Digital Rights Management<br>Ethical and Legal Implications of Security and Privacy<br>Formal Methods for Security<br>Human Factors and Human Behavior Recognition Techniques<br>Identification, Authentication and Non&#8211;repudiation<br>Identity Management<br>Information Hiding<br>Information Systems Auditing<br>Insider Threats and Countermeasures<br>Intellectual Property Protection<br>Intrusion Detection &amp; Prevention<br>Management of Computing Security<br>Network Security<br>Organizational Security Policies<br>Peer&#8211;to&#8211;Peer Security<br>Personal Data Protection for Information Systems<br>Privacy<br>Privacy Enhancing Technologies<br>Reliability and Dependability<br>Risk Assessment<br>Secure Software Development Methodologies<br>Security and Privacy in Complex Systems<br>Security and Privacy in Crowdsourcing<br>Security and Privacy in IT Outsourcing<br>Security and Privacy in Location&#8211;based Services<br>Security and Privacy in Mobile Systems<br>Security and Privacy in Pervasive/Ubiquitous Computing<br>Security and Privacy in Smart Grids<br>Security and Privacy in Social Networks<br>Security and Privacy in the Cloud<br>Security and Privacy in Web Services<br>Security and Privacy Policies<br>Security Area Control<br>Security Deployment<br>Security Engineering<br>Security in Distributed Systems<br>Security Information Systems Architecture<br>Security Management<br>Security Metrics and Measurement<br>Security Protocols<br>Security requirements<br>Security Verification and Validation<br>Sensor and Mobile Ad Hoc Network Security<br>Service and Systems Design and QoS Network Security<br>Software Security<br>Trust management and Reputation Systems<br>Ubiquitous Computing Security<br>Wireless Network Security<br></p>