این رویداد خاتمه یافته است و اطلاعات موجود در این سایت صرفا جنبه آرشیو دارد

:: Conference Topics


  • Foundations of cryptology
    • Foundation of cryptology
    • Symmetric cryptographic algorithms
    • Asymmetric and cryptographic algorithms and digital signatures
    • Hash functions
    • New methods in cryptography (post-quantum cryptography, functional cryptography, homomorphic cryptography, …
    • Information theoretic security
  • Implementation of cryptographic algorithms and related attacks
    • Software and hardware implementation of cryptographic algorithms
    • Side channel attacks and countermeasures
    • Embedded cryptographic systems
    • Hardware tampering and countermeasures
    • Cryptographic hardware accelerators
    • Verification and fault detection of implementations
  • Network security
    • Wireless and mobile network security
    • Security of network infrastructures
    • Security of network protocols and layers
    • Intrusion detection and prevention systems
    • Security of critical infrastructures
  • Cryptography and security protocols
    • Authentication and identification protocols
    • Anonymity, privacy and trust management
    • Cryptanalysis of security protocols
    • Trust and security models
    • Formal methods in information security
  • Security of computation
    • Security in computer architecture
    • Operating system security
    • Database security
    • Analysis of security and vulnerability of software and application programs
    • Security and privacy in mobile devices
    • Security of cloud computing
    • Access control
  • Security of data, systems and applications
    • Social engineering in security
    • Information security management system (ISMS)
    • Information security training
    • E-business and e-service security
    • E-health security
    • E-banking security
    • E-learning security
  • Information hiding
    • New algorithms in steganography and watermarking
    • Attack modeling and watermarking
    • Steganalysis
    • Applications of Information hiding
  • Digital forensics
    • Digital forensics methods
    • Database and network forensics
    • Fraud detection
    • Tamper detection and prevention

ISC

نمایه ISC

poster