SAM'10 - The 2010 International Conference on Security and Management
Last modified
2010-02-05 08:22
SAM'10 is the 9th annual conference
C A L L
F O R
P A P E R S
|
You are invited to submit a full paper for consideration. All
accepted papers will be published in the SAM conference
proceedings (in printed book form; later, the proceedings will
also be accessible online). Those interested in proposing
workshops/sessions, should refer to the relevant sections that
appear below.
Topics of interest include, but are not limited to,
the following:
- Security algorithms
- Security in e-Commerce and m-Commerce
- Surveillance technologies
- Novel biometric methods
- Security protocols
- Firewall systems
- Key management techniques
- Mobile network security
- Hacking techniques and related issues
- Security policies
- Secure OS
- Security in CDN (Contents Distribution Networks)
- Security for protocol management (SNMP, CMIP, etc)
- Location management
- QoS management
- Resource management
- Channel management
- Mobility management
- Encryption technologies
- VPN
- IDS (Intrusion Detection System)
- Digital contents copyright protection techniques
- Watermarking
- Honeypot
- Virus issues (detection, prevention, ...)
- Tracing techniques in internet
- Active networks
- Security in grid
- Biological security technologies
- High-tech systems at airports
- Face recognition systems
- Signature recognition systems
- System security management
- Network security management
- Management in network equipments
- SAN (Storage Area Networks) management
- Applications of block and stream ciphers
- Applications of public key cryptology
- Message authentication and hash functions
- Grid computing and security
- Cloud computing and security
- Web monitoring
- Trust computing
- Emerging technologies and applications
- Mission Assurance
- Risk Assessment and Risk Management
- Continuity of Operations and Business Impact Analysis
Click Here for more details
|
|