[FM-India] ICISS 2012, Call for Papers

Madhavan Mukund madhavan at cmi.ac.in
Thu Mar 29 22:19:50 IST 2012


Posting on behalf of Prof Shamik Sural, School of IT, IIT Kharagpur.

=====================================
Dr. Shamik Sural
Professor
School of Information Technology
Indian Institute of Technology, Kharagpur 721302 India
91-3222-282330 (W)
91-3222-282331 (R)
91-3222-220259 (R)
shamik at cse.iitkgp.ernet.in
shamik.sural at gmail.com
http://www.facweb.iitkgp.ernet.in/~shamik/
=====================================


ICISS 2012 International Conference on Information Systems Security,
Guwahati, India, December 15-19, 2012.
(Submissions due 13 July 2012)
(http://www.iitg.ernet.in/iciss2012/)

The  conference series ICISS (International Conference on Information
Systems  Security), held annually, provides a forum for disseminating
latest research  results in information and systems security. ICISS
2012, the eighth conference in this series, will be held under the aegis
of the newly formed Society for Research in  Information Security and
Privacy (SRISP). The  acceptance ratio of the first seven conferences
has averaged less than 30%, and the proceedings have been published as
part of the Springer Verlag series of Lecture Notes in Computer Science.
Submissions  are  encouraged from academia, industry and government
addressing theoretical and practical problems in information and systems
security and related areas.

Research community and academics are invited to submit  theoretical  and
application oriented full and short papers making a significant research
contribution on Information Systems Security. Papers with original research
and unpublished work are to be submitted.

Topics of interest include (but not limited to)
    * Application Security
    * Formal Methods in Security
    * Operating System Security
    * Authentication and Access Control
    * Intrusion Detection, Prevention & Response
    * Privacy and Anonymity
    * Biometric Security
    * Intrusion Tolerance and Recovery
    * Security in P2P, Sensor and Ad Hoc Networks
    * Data Security
    * Key Management and Cryptographic Protocols
    * Software Security
    * Digital Forensics and Diagnostics
    * Language-based Security
    * Vulnerability Detection and Mitigation
    * Digital Rights Management
    * Malware Analysis and Mitigation
    * Web Security
    * Distributed System Security
    * Network Security

For more information, please see http://www.iitg.ernet.in/iciss2012/

======================================================================


More information about the FMIndia mailing list