加入收藏夹
联系我们
关于本站
个人主页
西电导航
西安电子科技大学
    当前位置:首页>>学术会议
第14届信息安全国际会议(ISC 2011)
时间:2011-11-15 22:01    点击:   所属单位:计算机学院
【会议基本信息】
会议名称(中文) 第14届信息安全国际会议(ISC 2011)
会议名称(英文) The 14th Information Security Conference (ISC 2011)
所属学科 计算机科学理论,计算机软件,计算机应用技术,计算机网络,信息安全
会议类型 国际会议
会议论文集是否检索
开始日期 2011-10-26
结束日期 2011-10-29
所在国家 China
所在城市 Xi’an
具体地点 唐城宾馆
主办单位 China Computer Federation (CCF) Xidian University
协办单位
会议议题
【组织结构】
会议主席
组织委员会主席
程序委员会主席
会议嘉宾
【重要日期】
摘要截稿日期 2011-05-10
论文录用通知日期 2011-07-15
【会务组联系方式】
联系人
联系电话 +86-29-88204749
E-mail xyzhu@xidian.edu.cn
通讯地址
邮政编码
会议注册费
会议网站 http://ste.xidian.edu.cn/isc2011/
会议背景介绍   The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), ISW 1999 in Malaysia (LNCS 1729), ISW 2000 in Australia (LNCS 1975) and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). The latest conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), and Chile (ISC'07, LNCS 4779), Chinese Taipei(ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), USA (ISC’10).
征文范围及要求

  The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series. Topics of interest include, but are not limited to:

access control
accountability
anonymity and pseudonymity
applied cryptography
authentication
biometrics
computer forensics
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
formal methods in security
identity management
information dissemination control
information hiding and watermarking
intrusion detection
network security
peer-to-peer security
privacy
secure group communications
security and privacy in pervasive/ubiquitous computing
security in information flow
security in IT outsourcing
security for mobile code
secure cloud computing
security of eCommerce, eBusiness and eGovernment
security in location services
security modeling and architectures
security models for ambient intelligence environments
security in social networks
trust models and trust management policies
embedded security

转载请注明出处:西安电子科技大学学术信息网
如果您有学术信息或学术动态,欢迎投稿。我们将在第一时间确认并收录,投稿邮箱: meeting@xidian.edu.cn
Copyright © 2011-2017 西安电子科技大学 
开发维护:电子工程学院网络信息中心  管理员:meeting@xidian.edu.cn 站长统计: