Conferences In Information Security

Conference Name 4th International Workshop on Security
Venue Toyama, Japan
URL http://www.iwsec.org/
Submission Deadline 17-Apr-10
Conference Date October 28-30 2010.
Sponsership/Publisher
Aim/Scope/Research Area IWSEC 2010 will select submissions from three tracks, and the review and selection processes of these tracks will be independent of each other. Track III (security in real life applications) is a new track designed to allow researchers and practitioners to share their research and experience. We welcome papers that highlight the practical aspects of security technologies and industrial case studies. Topics of interest for the conference include but are not limited to:
Track I: Foundations of Security
(Track Chair: Noboru Kunihiro, The University of Tokyo, Japan)
Authentication
Biometrics
Block/Stream Ciphers
Cryptographic Protocols
Cryptanalysis
Digital Signatures
Hash Functions
Information Hiding
Public Key Cryptosystems
Quantum Security

Track II: Security in Networks and Ubiquitous Computing Systems
(Track Chair: Isao Echizen, National Institute of Informatics, Japan)
Network Security
Intrusion Detection
Malware Detection
Security in Sensor Networks
Security of Ubiquitous and Cloud Computing
Security of Multi-party Computing
Authorization and Access Control
Mobile Security
Privacy Enhancing Technology
Anonymity-related Technology
Privacy Preserving System
Privacy on WEB and DB
Software Security
Security Architectures
Data and System Integrity
Reliable Secure Interactions of Services
Track III: Security in Real Life Applications
(Track Chair: Ryoichi Sasaki, Tokyo Denki University, Japan)
Secure Living and Working Environments
Secure Consumer Electronics
RFID Security
Security in Commerce and Government
DRM
Copyright Protection
Content Security E-business/e-commerce/e-government Security
Security Management
Access Control Policies
ISMS
Protection of Critical Infrastructures
Critical Infrastructure Protection
Risk Analysis and Risk Management
Testing, Verification and Certification
Security Verification
Assurance
Law, Policy, Ethics and Related Technologies
Digital Forensics
Information Law and Ethics

Back To Conferences List

Database Sections