Call for Papers

6th International Conference on Cryptography and Information Security (CRYPIS 2017) focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.


Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to


Topics of Interest

Cryptographic Protocols

Cryptography and Coding

Untraceability

Privacy and authentication

Key management

Authentication

Trust Management

Quantum cryptography

Computational Intelligence in Security

Artificial Immune Systems

Biological & Evolutionary Computation

Intelligent Agents and Systems

Reinforcement & Unsupervised Learning

Autonomy-Oriented Computing

Coevolutionary Algorithms

Fuzzy Systems

Biometric Security

Trust models and metrics

Regulation and Trust Mechanisms

Data Integrity

Models for Authentication, Trust and Authorization

Access Control and Intrusion Detection

Intrusion Detection and Vulnerability Assessment

Authentication and Non-repudiation

Identification and Authentication

Insider Threats and Countermeasures

Intrusion Detection & Prevention

Secure Cloud Computing

Security Information Systems Architecture and Design and Security Patterns

Security Management

Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)

Sensor and Mobile Ad Hoc Network Security

Service and Systems Design and QoS Network Security

Software Security

Security and Privacy in Mobile Systems

Security and Privacy in Pervasive/Ubiquitous Computing

Security and Privacy in Web Sevices

Security and Privacy Policies

Security Area Control

Security Deployment

Security Engineering

Security for Grid Computing

Security in Distributed Systems

Paper Submission

Authors are invited to submit papers through the Conference Submission System by May 12, 2017. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & InformationTechnology (CS & IT) series(Confirmed).


Selected papers from CRYPIS 2017, after further revisions, will be published in an International Journal.


International Journal of Network Security & Its Applications ( IJNSA ) - ERA Indexed

International Journal on Cryptography And Information Security ( IJCIS )

International Journal of Security, Privacy and Trust Management( IJSPTM )

Important Dates

Submission Deadline : May 12, 2017

Authors Notification : June 12, 2017

Final Manuscript Due : June 15, 2017

Co - Located Event

6th International Conference on Digital Image Processing and Vision (ICDIPV 2017)

Program Committee Members

A K M Arifuzzman, University of Alabama at Birmingham, USA

Ahmed H. Salem ,Old Dominion University, USA

Ahmed J. Jameel, Ahlia University, Bahrain

Alborzi, Nanyang Technological University, Singapore

Aleksandar Sugaris, ICT College , Serbia

Ameen Chilwan, Norwegian University of Science and Technology, Norway

Asmaa Shaker Ashoor, Babylon University, Iraq

Atallah M, AL-Shatnawi, Al al-Byte University, Jordan

Azeddine Chikh, University of Tlemcen, Algeria

Babar Shah, Zayed University ,UAE

Boukenadil Bahidja, University of Tlemcen, Algeria

Dimitris Kontoudis,University of Macedonia, Greece

Doina Bein, The Pennsylvania State University, USA

El Miloud Ar-reyouchi, Abdelmalek Essaadi University and SNRT, Morocco

Emilio Jiménez Macías, University of La Rioja, Spain

Erritali Mohammed, Sultan Moulay Slimane University, Morocco



Explore Existing Conferences Across the World or Publish a Conference to Showcase It Globally in VePub.
 

This is an animated dialog which is useful for displaying information. The dialog window can be moved, resized and closed with the 'x' icon.

These items will be permanently deleted and cannot be recovered. Are you sure?