International Conference on Cryptography and Information Security (ICCIS)
Attendees
Speakers
Sponsors
Exhibitors
About
Cryptographic protocols Cryptography and Coding Untraceability Privacy and authentication Key management Authentication Trust Management Quantum cryptography Computational Intelligence in Security Artificial Immune Systems Biological & Evolutionary Computation Intelligent Agents and Systems Reinforcement & Unsupervised Learning Autonomy-Oriented Computing Coevolutionary Algorithms Fuzzy Systems Biometric Security Trust models and metrics Regulation and Trust Mechanisms Data Integrity Models for Authentication, Trust and Authorization Wireless Network Security Information Hiding E- Commerce Data & System Integrity Access Control and Intrusion Detection Intrusion Detection and Vulnerability Assessment Authentication and Non-repudiation Identification and Authentication Insider Threats and Countermeasures Intrusion Detection & Prevention Secure Cloud Computing Security Information Systems Architecture and Design and Security Patterns Security Management Security Requirements (threats, vulnerabilities, risk, formal methods, etc.) Sensor and Mobile Ad Hoc Network Security Service and Systems Design and QoS Network Security Software Security Security and Privacy in Mobile Systems Security and Privacy in Pervasive/Ubiquitous Computing Security and Privacy in Web Sevices Security and Privacy Policies Security Area Control Security Deployment Security Engineering Security for Grid Computing Security in Distributed Systems
Speakers (1)
World Academy of Science, Engineering and Technology