CRITIS 2018, the 13th edition of the CRITIS series of conferences, seeks to promote innovative research and key achievements in the field of critical (information) infrastructure protection and resilience.
The CRITIS series of conferences foster the cross-sector dialogue between relevant stakeholders: academics, practitioners, critical (information) infrastructure operators, industry, defence sector and policy-makers.
Moreover, CRITIS aims to encourage and inspire early stage and open-minded researchers in this demanding multi-disciplinary field of research. Outstanding research performance demonstrated by young researchers may compete for the Young CRITIS Award (YCA).
CRITIS 2018 covers three thematic foci. Paper submission is encouraged but not limited to the following topics. Note: Definitions for the keywords used in this Call for Papers can be found in the online glossary CIPedia. -Topic 1: Technologies: Innovative responses for the protection of cyber-physical systems -Topic 2: Advances in C(I)IP organisation: Policies, good practices and lessons learned -Topic 3: Advances in Human Factors, decision support, and cross-sector CI(I)P approaches – focus on end-users
信息安全及密码学
DSC 2018
IEEE Conference on Dependable and Secure Computing
全文截稿: 2018-05-01
开会时间: 2018-12-10
会议难度: ★★
CCF分类: 无
会议地点: Kaohsiung, China
网址:http://dsc2018.nsysu.edu.tw/
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The scope of DSC includes, but is not limited to, the following topics.
Regular Track: Computer Systems, Networks and Software/Hardware -Advanced Persistent Threat (APT) -Network Attack and Defense Techniques -Botnet and Intrusion Detection -Cryptographic Methods and Toolkits -Cyber attacks -Software Vulnerabilities and Security -Database Security and Privacy -Embedded Systems and IoT Devices -Mobile and Cloud Computing security -AI and Big Data Analysis for security -Malware Mutation -Deep Learning for Attack and Defense -Block Chain and Finance Security -Security Hardware and Circuits -Authentication and Authorization -Soft-Error Analysis and Models -CAD Algorithms and Tools -Electronic Circuits and Systems -Fault-Tolerance and Reliability -Industrial Design Experiences -Noise- and Power-Aware Designs -Stochastic Circuits and Systems -Temperature-Aware Designs -Variable-Latency Designs
信息安全及密码学
ICICS 2018
International Conference on Information and Communications Security
The 2018 International Conference on Information and Communications Security will be the 20th event in the ICICS conference series. The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security.
ICICS 2018 will be organized by IMT Lille Douai of Institut Mines-Télécom, the largest engineering graduate school in northern France.
信息安全及密码学
ASID 2018
International Conference on Anti- counterfeiting, Security, and Identification
全文截稿: 2018-06-15
开会时间: 2018-10-19
会议难度: ★
CCF分类: 无
会议地点: Xiamen, China
网址:fjic.xmu.edu.cn/asid/index.html
This conference (the 12th International Conference on Anti -counterfeiting, Security, and Identification) will provide a unique forum for researchers, engineers and educators interested in live demonstrations describing novel work on systems, applications and services of the Internet reaching out into the real world of physical objects. The conference to be held on October, 2018 in Xiamen, China. The conference content will be submitted for inclusion into IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. (All the papers in the 2007-2016ASID were all indexd by EI Database)
Topics include (but are not limited to): -Deep Learning and Recognition Computing -Big Data and Information Security -Wearable Electronics and Health & Leisure -Micro/Nano-sensor and BioMEMS -Multi-core Processor and Reconfigurable Computing -Cloud Computing & Internet of Things (IoT) -Cryptographic Algorithm and Security Management -Wireless Communication and Networking Engineering -IC Design and System Integration -EMC Theory and RFID Techniques
Provable security is an essential tool for analyzing security of modern cryptographic primitives. The research community has witnessed the great contributions that the provable security methodology made to the analysis of cryptographic schemes and protocols. Nowadays cryptographic primitives without a rigorous "proof" cannot be regarded as sound. Also, the methodology has been used to discover security flaws in the cryptographic schemes and protocols, which were considered seemingly secure without formal analysis. On the one hand, provable security provides confidence in using cryptographic schemes and protocols for various real-world applications, but on the other hand, schemes with provable security are sometimes not efficient enough to be used in practice, and correctness of the proofs may be difficult to verify. Therefore, ProvSec conference is to provide a platform for researchers, scholars and practitioners to exchange new ideas on diverse problems in provable security.
Conference Topics: All aspects of provable security in constructing and analyzing cryptographic primitives, including but are not limited to: -Provably secure asymmetric primitives -Provably secure symmetric primitives -Tightness of security reductions -Provable security in post-quantum cryptography -Privacy and anonymity technologies -Cryptographic protocol verifier -Theory and practice of game-hopping proof techniques -Secure hash functions -Provable security in the real-world security systems -Secure key management -Refinement of proof techniques -Provably Secure cryptographic protocols and applications -Security notions, approaches and paradigms -Steganography -Lightweight cryptography -Lattice-based cryptography
ICICS:International Conference on Information and Communications Security。
Explanation:信息和通信安全国际会议。
Publisher:Springer。
SIT: http://dblp.uni-trier.de/db/conf/icics/