Abbrevation
ICISS
City
Seoul
Country
North Korea
Deadline Paper
Start Date
End Date
Abstract

<br>Conference Scope and Topics<br>Track 1: Information Security<br>&#8211; Access Control<br>&#8211; Anti&#8211;Malware<br>&#8211; Accounting and Audit<br>&#8211; Applied Cryptography<br>&#8211; Authentication and Authorization<br>&#8211; Biometrics<br>&#8211; Block and Stream Ciphers<br>&#8211; Cryptanalysis<br>&#8211; Cryptographic Protocol<br>&#8211; Cloud Computing Security<br>&#8211; Database Security<br>&#8211; Digital Forensics<br>&#8211; Distributed System Security<br>&#8211; Electronic Commerce<br>&#8211; Embedded Systems Security<br>&#8211; Hardware Security<br>&#8211; Homomorphic Encryption<br>&#8211; ID&#8211;Based Cryptography<br>&#8211; Intrusion Detection and Prevention<br>&#8211; Key Management<br>&#8211; Mobile and Wireless Security<br>&#8211; Network Security<br>&#8211; Operating System Security<br>&#8211; Privacy&#8211;Enhancing Technology<br>&#8211; Public Key Cryptography<br>&#8211; Security Architectures<br>&#8211; Security Policy<br>&#8211; Software Security<br>&#8211; Usable Security and Privacy<br>&#8211; Web Security<br>Track 2: Information and Computer Science<br>&#8211; Artificial Intelligence<br>&#8211; Cloud Computing<br>&#8211; Communication<br>&#8211; Computer Hardware<br>&#8211; Computer Vision<br>&#8211; Data Mining<br>&#8211; Digital Information<br>&#8211; E&#8211;learning<br>&#8211; Graphics and Visualization<br>&#8211; Hardware&#8211;Software Integration<br>&#8211; Human&#8211;Computer Interaction &amp; Interactive Multimedia<br>&#8211; Image Processing<br>&#8211; Internet Technology<br>&#8211; Machine Learning<br>&#8211; Pattern Recognition<br>&#8211; Modeling and Simulation<br>&#8211; Multimedia Computing<br>&#8211; Networks<br>&#8211; Operating Systems<br>&#8211; Optimization<br>&#8211; Robotics<br>&#8211; Simulators<br>&#8211; Soft Computing<br>&#8211; Software Engineering<br>&#8211;Wearable Computing<br>