International Conference on Computer, Information Systems Security and Cryptology ICCISSC on July 29-30, 2021 in Zurich, Switzerland

Submit Your Paper
International Conference on Computer, Information Systems Security and Cryptology (ICCISSC) July 29, 2021 - Zurich, Switzerland
Cyber Security and Defense

Cryptographic Protocols for Cloud Security
Energy/Cost/Efficiency of Security in Clouds
Secure Data Management Outsourcing
Secure Computation Outsourcing
Trusted Computing Technology and Clouds
Trust and Policy Management in Clouds
Security Risk Models and Clouds
Spying
Social Networks
Critical Infrastructures
Cloud Computing
Threats
Practices and Solutions
Strategies and Policies
Laws
Standards
International Collaboration

Data Privacy

Privacy Foundations
Privacy Enhancing Technologies
Privacy-Preserving Computing
Privacy Policies and Laws
Electronic Healthcare Privacy
Economics of Privacy
Privacy Theory and Engineering
Natural Disasters and Emergencies, and Terrorism Protection
Risk Analysis, Modeling, and Management
Trust Formalization and Modeling
Trustworthy Computing
Trust Management
Trust Evaluation
Security Foundations

E-Governance Security

E-Government Security
E-Archive
E-Bid
E-Commerce
E-Health
E-Id
E-Invoice
E-Justice
E-Notary
E-Passport
E-Voting
Critical Information Infrastructure Protection
Virtual Wars and Countermeasures
Information Systems and Crime Analysis
Risk Evaluation and Security Certification

Public Key Infrastructure

Digital Signature
Certified Electronic Mail
Certificates and Certificate Management
Standards
Protocols
Trust Models
Key and Identity Management
Hardware / Software Applications
Digital Signature Policies and Law
Validity of Digital Signature in Government, Finance, and Commerce
Effects of Digital Signature on Digital Signature Law
Responsibilities for Opponents to ESSP in Law in Digital Signature
Discrepancy between Digital Signatures
Judgments related to Digital Signatures
Digital Signature Law in Other Countries

Cryptology

Boolean Functions
Block Ciphers
Stream Ciphers
Public Key Cryptography
Quantum Cryptography
Elliptic Curve Cryptography
Algebraic Curves in Cryptography
Homomorphic Encryption
Cryptographic Protocols
Zero Knowledge
Secret Sharing
Cryptanalysis
Hash Functions
Applications of Coding Theory in Cryptography
Smart Card Applications and Security
RFID Security
Cryptographic Hardware and Embedded Systems
Special Purpose Hardware for Attacking Cryptographic Systems
Efficient Software and Hardware Implementations
Side Channel Analysis and Countermeasures
Pairing Based Cryptography
Key and Identity Management

Information Security

Steganography
Secure Multiparty Computation
Biometric Approaches
Computer Security
Mobile Communications Security
Operating System Security
Trusted Computing
Network Security
Wireless Security
Ad Hoc and Sensor Network Security
Peer to Peer Network Security
Web Security
E-mail Security
Database Security
IPTV Security
E-commerce Protocols
Content filtering and tracing
Copyright protection
Distributed System Security
Security Weaknesses on Information Technologies
Secure Code Development
Penetration Tests
Intrusion Detection Systems
Malicious Codes
Viruses, Spyware, Spamware, Scam

Information Forensics and Security

Digital Forensics
Signal processing in the encrypted domain
Forensics for Communication
Digital forensics tools
Digital Evidence Management
Digital Evidence Analytics
Digital Forensics Surveillance Technology and Procedures
Digital evidence visualisation and communication
Digital evidence storage and preservation
Incident response and investigation
Forensic procedures
Portable electronic device forensics
Network forensics
Data hiding and recovery
Network traffic analysis, traceback and attribution
Legal, ethical and policy issues related to digital forensics
Integrity of digital evidence and live investigations
Multimedia analysis in
Trends and Challenges
Evidence Protection
Forensics case studies

Sectoral Applications

E-government Applications
M-government Applications
Applications of Electronic Signature Certificate Providers
Applications for Banks and Finance Institutions
GSM Operators

Name: World Academy of Science, Engineering and Technology
Website: https://waset.org/
Address: UAE

World Academy of Science, Engineering and Technology is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program.
Description Price Date
Presenter Sign Up Fee EUR 350.00 Before June 29, 2021
Listener Sign Up Fee EUR 250.00 Before June 29, 2021