Información de la conferencia
CSIA 2014: International Conference on Communications Security & Information Assurance
Día de Entrega:
2014-04-10 Extended
Fecha de Notificación:
Fecha de Conferencia:
Delhi, India
Vistas: 3590   Seguidores: 1   Asistentes: 0

Solicitud de Artículos
The Conference focuses on all technical and practical aspects of Communications Security & Information Assurance (CSIA)for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Communication Security & Information assurance

Topics of Interest

    Access control, Anonymity, Audit and audit reduction & Authentication and authorization
    Applied cryptography, Cryptanalysis, Digital Signatures
    Biometric security
    Boundary control devices
    Certification and accreditation
    Cross-layer design for security
    Data and system integrity, Database security
    Defensive information warfare
    Denial of service protection, Intrusion Detection, Anti-malware
    Distributed systems security
    Electronic commerce
    E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection
    Grid security
    Information hiding and watermarking & Information survivability
    Insider threat protection, Integrity
    Intellectual property protection
    Internet/Intranet Security
    Key management and key recovery
    Language-based security
    Mobile and wireless security
    Mobile, Ad Hoc and Sensor Network Security
    Monitoring and surveillance
    Multimedia security ,Operating system security, Peer-to-peer security
    Performance Evaluations of Protocols & Security Application
    Privacy and data protection
    Product evaluation criteria and compliance
    Risk evaluation and security certification
    Risk/vulnerability assessment
    Security & Network Management
    Security and Assurance in Operational, Technological, commercial Area
    Security Engineering and Its Application
    Security Models & protocols
    Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
    Trusted computing
    Ubiquitous Computing Security
    Virtualization security, VoIP security, Web 2.0 security

Paper submission

Authors are invited to submit papers through the  conference Submission system by January 31, 2014. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference.The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from CSIA 2014, after further revisions,will be published in the special issue of the following journal.

    International Journal of Network Security & Its Applications (IJNSA)ERA Indexed
    International Journal On Cryptography And Information Security (IJCIS)
    International journal of Computer Networks & Communications (IJCNC) ERA Indexed
    International Journal of Wireless & Mobile Networks (IJWMN)ERA Indexed
    Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (J GRAPH-HOC)
    International Journal of Next-Generation Networks ( IJNGN )
    International Journal of Peer-to-Peer networks ( IJP2P )
    International Journal of Distributed and Parallel Systems ( IJDPS )

Important Dates
Submission Deadline: January 31, 2014
Authors Notification: April 01, 2014
Final Manuscript Due : April 20, 2014
Última Actualización Por Dou Sun en 2014-04-04
Conferencias Relacionadas
Revistas Relacionadas