Topics of interest include but are not limited to, the following
- Cryptographic protocols
- Cryptography and Coding
- Untraceability
- Privacy and authentication
- Key management
- Authentication
- Trust Management
- Quantum cryptography
- Computational Intelligence in Security
- Artificial Immune Systems
- Biological & Evolutionary Computation
- Intelligent Agents and Systems
- Reinforcement & Unsupervised Learning
- Autonomy-Oriented Computing
- Coevolutionary Algorithms
- Fuzzy Systems
- Biometric Security
- Trust models and metrics
- Regulation and Trust Mechanisms
- Data Integrity
- Models for Authentication, Trust and Authorization
- Wireless Network Security
- Information Hiding
- Data & System Integrity
- E- Commerce
- Access Control and Intrusion Detection
- Intrusion Detection and Vulnerability Assessment
- Authentication and Non-repudiation
- Identification and Authentication
- Insider Threats and Countermeasures
- Intrusion Detection & Prevention
- Secure Cloud Computing
- Security Information Systems Architecture and Design and Security Patterns
- Security Management
- Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Security and Privacy in Mobile Systems
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Web Sevices
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security for Grid Computing
- Security in Distributed Systems
|