Conference scope
Papers offering novel research contributions in any aspect of computer security are solicited for submission to the 20th IFIP International Information Security Conference. Papers may present theory, applications or practical experiences on topics including, but not limited to:
- Applications of cryptography
- Authentication
- Data protection
- DRM & content security
- Privacy, anonymity
- Computer forensics
- Internet and web security
- Information hiding
- Security in sensor networks
- Intrusion detection
- Security management
- Security verification
- Commercial and industrial security
- Data and system integrity
- Authorization and access control
- Information warfare and critical protection infrastructure
- Security models and policies
- Risk analysis and risk management
- Secure e-government
- e-business/e-commerce security
- Secure information systems development
- Assurance
- Key management
- Security architectures
- Information law, ethics
- Mobility and ubiquitous systems