Topics:<br>Security of Web–based applications and services<br>Anti–malware techniques: detection, analysis, and prevention<br>Intrusion prevention, detection, and response<br>Security for electronic voting<br>Combating cyber–crime: anti–phishing, anti–spam, anti–fraud techniques<br>Privacy and anonymity technologies<br>Network perimeter controls: firewalls, packet filters, and application gateways<br>Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems<br>Security for Vehicular Ad–hoc Networks (VANETs)<br>Security for peer–to–peer and overlay network systems<br>Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing<br>Implementation, deployment and management of network security policies<br>Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management<br>Integrating security services with system and application security facilities and protocols<br>Public key infrastructures, key management, certification, and revocation<br>Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost<br>Security for collaborative applications: teleconferencing and video–conferencing<br>Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)<br>Security for large–scale systems and critical infrastructures<br>Integrating security in Internet protocols: routing, naming, network management<br>For more topics: http://www.icins.org/cfp.html<br>
Abbrevation
ICINS
City
Shanghai
Country
China
Deadline Paper
Start Date
End Date
Abstract