Scope
Last modified
2009-12-07 00:02
Topics of interest include, but are not limited to,
the following:
- Security algorithms
- Security in e-Commerce and m-Commerce
- Surveillance technologies
- Novel biometric methods
- Security protocols
- Firewall systems
- Key management techniques
- Mobile network security
- Hacking techniques and related issues
- Security policies
- Secure OS
- Security in CDN (Contents Distribution Networks)
- Security for protocol management (SNMP, CMIP, etc)
- Location management
- QoS management
- Resource management
- Channel management
- Mobility management
- Encryption technologies
- VPN
- IDS (Intrusion Detection System)
- Digital contents copyright protection techniques
- Watermarking
- Honeypot
- Virus issues (detection, prevention, ...)
- Tracing techniques in internet
- Active networks
- Security in grid
- Biological security technologies
- High-tech systems at airports
- Face recognition systems
- Signature recognition systems
- System security management
- Network security management
- Management in network equipments
- SAN (Storage Area Networks) management
- Applications of block and stream ciphers
- Applications of public key cryptology
- Message authentication and hash functions
- Grid computing and security
- Cloud computing and security
- Web monitoring
- Trust computing
- Emerging technologies and applications
|
|