ISCTURKEY2012

''Call For Papers'

Topics
Cyber Security Spying Social Networks Critical Infrastructures Cloud Computing Threats Practices and Solutions Strategies and Policies Laws Standards International Collaboration

Data Privacy Privacy Foundations Privacy Enhancing Technologies Privacy-Preserving Computing Privacy Policies and Laws Electronic Healthcare Privacy Economics of Privacy Privacy Theory and Engineering Natural Disasters and Emergencies, and Terrorism Protection Risk Analysis, Modeling, and Management Trust Formalization and Modeling Trustworthy Computing Trust Management Trust Evaluation

Security Foundations E-Government Security E-Archive E-Bid E-Commerce E-Health E-Id E-Invoice E-Justice E-Notary E-Passport E-Voting

Critical Information Infrastructure Protection Virtual Wars and Countermeasures Information Systems and Crime Analysis Risk Evaluation and Security Certification

Public Key Infrastructure Digital Signature Certified Electronic Mail Certificates and Certificate Management Standards Protocols Trust Models Key and Identity Management Hardware / Software Applications Digital Signature Policies and Law Validity of Digital Signature in Government, Finance, and Commerce Effects of Digital Signature on Digital Signature Law Responsibilities for Opponents to ESSP in Law in Digital Signature Discrepancy between Digital Signatures Judgments related to Digital Signatures Digital Signature Law in Other Countries Cryptology Boolean Functions Block Ciphers Stream Ciphers Public Key Cryptography Quantum Cryptography Elliptic Curve Cryptography Algebraic Curves in Cryptography Cryptographic Protocols Zero Knowledge Secret Sharing Cryptanalysis Hash Functions Applications of Coding Theory in Cryptography Smart Card Applications and Security RFID Security Cryptographic Hardware and Embedded Systems Special Purpose Hardware for Attacking Cryptographic Systems Efficient Software and Hardware Implementations Side Channel Analysis and Countermeasures Pairing Based Cryptography Key and Identity Management

Information Security Steganography Secure Multiparty Computation Biometric Approaches Computer Security Mobile Communications Security Operating System Security Trusted Computing Network Security Wireless Security Ad Hoc and Sensor Network Security Peer to Peer Network Security Web Security E-mail Security Database Security IPTV Security E-commerce Protocols Content filtering and tracing Copyright protection Distributed System Security Security Weaknesses on Information Technologies Secure Code Development Penetration Tests Intrusion Detection Systems Malicious Codes Viruses, Spyware, Spamware, Scam

Information Forensics and Security Digital Forensics Signal processing in the encrypted domain Forensics for Future Generation Communication (FGC) Digital forensics tools in FGC Digital Evidence Management in FGC Digital Evidence Analytics in FGC Digital Forensics Surveillance Technology and Procedures in FGC Digital evidence visualization and communication for FGC Digital evidence storage and preservation in FGC Incident response and investigation in FGC Forensic procedures in FGC Portable electronic device forensics for FGC Network forensics in FGC Data hiding and recovery in FGC Network traffic analysis, trace back and attribution in FGC Legal, ethical and policy issues related to digital forensics in FGC Integrity of digital evidence and live investigations Multimedia analysis in FGC Trends and Challenges for FGC Evidence Protection in FGC Forensics case studies in FGC

Sectoral Applications E-government Applications M-government Applications Applications of Electronic Signature Certificate Providers Applications for Banks and Finance Institutions GSM Operators

Important Dates
Submission deadline                          March 01, 2012

Notification of decision                     March 31, 2012

Proceedings version deadline            April 10, 2012

Conference                                      May 17 - 19, 2012