Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      

International Journal of Information Security and Applications(IJISA)

IJISA

Date of beginning

Wednesday, 26 June 2019

Duration

2 days

Deadline for abstracts

Friday, 28 June 2019

City

CHENNAI

Country

India

Contact

 Authentication  Trust Management  Quantum cryptography  Computational Intelligence in Security  Artificial Immune Systems

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

2019-05-26

Memo

International Journal of Information Security and Applications(IJISA) ISSN 0974 - 624N (Online) ; 0175 - 2190 (Print) http://skycs.org/jounals/ijisa/Home.html Scope International Journal of Information Security and Applications(IJISA) is a open access journal that publishes articles which contribute new results in all areas Information Security and Applications. The journal focuses on all technical and practical aspects of Information Security and Applications. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Information Security and Applications. Topics of interest include, but are not limited to, the following Ø  Cryptographic protocols Ø  Cryptography and Coding Ø  Untraceability Ø  Privacy and authentication Ø  Key management Ø  Authentication Ø  Trust Management Ø  Quantum cryptography Ø  Computational Intelligence in Security Ø  Artificial Immune Systems Ø  Biological & Evolutionary Computation Ø  Intelligent Agents and Systems Ø  Reinforcement & Unsupervised Learning Ø  Autonomy-Oriented Computing Ø  Coevolutionary Algorithms Ø  Fuzzy Systems Ø  Biometric Security Ø  Trust models and metrics Ø  Regulation and Trust Mechanisms Ø  Data Integrity Ø  Models for Authentication, Trust and Authorization Ø  Wireless Network Security Ø  Information Hiding Ø  Data & System Integrity   Ø  E- Commerce Ø  Access Control and Intrusion Detection Ø  Intrusion Detection and Vulnerability Assessment Ø  Authentication and Non-repudiation Ø  Identification and Authentication Ø  Insider Threats and Countermeasures Ø  Intrusion Detection & Prevention Ø  Secure Cloud Computing Ø  Security Information Systems Architecture and Design and Security Patterns Ø  Security Management Ø  Security Requirements (threats, vulnerabilities, risk, formal methods, etc.) Ø  Sensor and Mobile Ad Hoc Network Security Ø  Service and Systems Design and QoS Network Security Ø  Software Security Ø  Security and Privacy in Mobile Systems Ø  Security and Privacy in Pervasive/Ubiquitous Computing Ø  Security and Privacy in Web Sevices Ø  Security and Privacy Policies Ø  Security Area Control Ø  Security Deployment Ø  Security Engineering Ø    Security for Grid ComputingSecurity in Distributed Systems       Paper Submission   Authors are invited to submit papers for this journal through Submission System.  Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates Submission Deadline :May 26, 2019 Notification :June 26, 2019 Final Manuscript Due :June 30, 2019 Publication Date : Determined by the Editor-in-Chief TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK  Submission System.  Contacts                    Here's where you can reach us: This email address is being protected from spambots. You need JavaScript enabled to view it.