Call for Papers    Program Schedule   Proceedings    Conference Photos

 

Second International Conference on Cryptography and Information Security (CRIS 2016) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in applied cryptography and Information security.

 

Topics of interest include, but are not limited to the following:

  • Cryptographic protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Coevolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Wireless Network Security
  • Information Hiding
  • E- Commerce
  • Data & System Integrity
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

 

Paper Submission

 

Authors are invited to submit Papers through the Conference Submission System by February 27, 2016. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS&IT) series (Confirmed).

 

Important Dates

Second Batch : (Submissions after January 29, 2016)

Submission Deadline  : February 27, 2016
Authors Notification  : March 13, 2016
Registration &
Camera-Ready Paper Due : March 20, 2016

First Batch

Submission Deadline  : December 31, 2015
Authors Notification  : January 20, 2016
Registration &
Camera-Ready Paper Due : January 30, 2016

 

 

 

Proceeding

 

The Registration fee is 350 Euro. Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library.

 

Other Conferences

 

COSIT 2016
CYBI 2016
AIAPP 2016
SEC 2016
SIGL 2016
DMA 2016

 

Courtesy

 


Technically Sponsored by