allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

Second International Conference on Codes, Cryptology and Information Security

google+
Views: 758                 

When :  2017-04-07

Where :  Rabat, Morocco

Submission Deadline :  2016-12-15

Categories :   Networks & Communications ,  Data Mining      

Second International Conference on Codes, Cryptology and Information Security

(C2SI 2017)

April 10

Rabat, Morocco

Call For Papers

Second International Conference on Codes, Cryptology and Information Security (C2SI2017), In honor of Professor Claude CARLET
This event is organized in cooperation with the International Association for Cryptologic Research.The bi-annual C2SI 2017 conference aims to bring together researchers in the fields of coding theory, cryptology and information Security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas.The conference seeks submissions in these fields from academia, government, and industry presenting novel research. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences.In addition to a single track of high-quality presentations, C2SI 2017 will offer invited talks.

Topics

Topics of interest include but are not limited to:
  • Coding theory,
  • error correcting codes
  • Boolean Functions,
  • Information theory,
  • Elliptic curves
  • Finite fields
  • Complexity
  • Information Hiding
  • Steganography
  • Watermarking
  • Fingerprinting
  • Cryptography of algebraic curves,
  • Euclidean networks Based Cryptography
  • Stream ciphers
  • Quantum Cryptology
  • Symmetric and Asymmetric Cryptographic Protocols
  • Random generators and pseudorandom
  • Algebraic Cryptanalysis and polynomial systems
  • hardware implementations and side channel attacks
  • Information Security
  • Identification, Authentication, Signature and Non-repudiation
  • protocols based on identity or attributes
  • Intrusion Detection & Prevention
  • Mobile Security
  • Smart cards Security
  • Network Security
  • Identity and Security in IoT
  • Big data and Security
  • Mobile Agents and Security
  • Operating systems security
  • Security Models and Architectures
  • Security Policies, Formal methods & verification
  • Access Control Models.

IMPORTANT DATES

  • Paper submission: December 15, 2016
  •                        
  • Notification of acceptance: January 30, 2017
  •            
  • Final manuscripts due: February 7, 2017
  •                       

    User Name : shaun
    Posted 28-07-2016 on 15:18:11 AEDT


    Related CFPs

    IJSPTM   International Journal of Security, Privacy and Trust Management
    NLP 2026   15th International Conference on Natural Language Processing
    ITCS 2026   15th International Conference on Information Technology Convergence and Services (ITCS 2026)
    CDKP 2026   15th International Conference on Data Mining & Knowledge Management Process (CDKP 2026)

    All Rights Reserved @ Call for Papers - Conference & Journals