Scope

Original papers on the research and development of various security topics are solicited for submission to IWSEC 2012. Topics of interest for IWSEC 2012 include but are not limited to:


  • Foundations of Security
    • Authentication
    • Biometrics
    • Block/Stream Ciphers
    • Cryptographic Protocols
    • Cryptanalysis
    • Digital Signatures
    • Hash Functions
    • Information Hiding
    • Public Key Cryptosystems
    • Quantum Security
    • Cryptographic Implementations and their Analysis
  • Security in Networks and Ubiquitous Computing Systems
    • Network Security
      • Intrusion Detection
      • Malware Detection
      • Security in Sensor Networks
    • Security of Ubiquitous and Cloud Computing
      • Security of Multi-party Computing
      • Authorization and Access Control
      • Mobile Security
    • Privacy Enhancing Technology
      • Anonymity-related Technology
      • Privacy Preserving System
      • Privacy on Web and DB
    • Software Security
      • Security Architectures
      • Data and System Integrity
      • Reliable Secure Interactions of Services
    • System Security
      • Operating System Security
      • Trusted Computing
  • Security in Real Life Applications
    • Secure Living and Working Environments
      • Secure Consumer Electronics
      • RFID Security
    • Security in Commerce and Government
      • DRM
      • Copyright Protection
      • Content Security E-business/e-commerce/e-government Security
    • Security Management
      • Access Control Policies and ISMS
      • Business Processes Security
    • Protection of Critical Infrastructures
      • Critical Infrastructure Protection
      • Risk Analysis and Risk Management
    • Testing, Verification and Certification
      • Security Verification
      • Assurance
    • Law, Policy, Ethics and Related Technologies
      • Digital Forensics
      • Information Law and Ethics