SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
12th
International Conference on Communications Security & Information
Assurance (CSIA 2021)
November 20 ~ 21, 2021, Zurich, Switzerland
https://iccsea2021.org/csia/index
Scope
12th
International Conference on Communications Security & Information Assurance
(CSIA 2021) focuses on all technical and practical aspects of communications security &
information assurance for wired and wireless networks. The goal of this conference is to bring
together researchers and practitioners from academia and industry to focus on understanding
modern security threats and countermeasures, and establishing new collaborations in these areas
Authors are solicited to contribute to the conference by submitting articles that illustrate
research results, projects, surveying works and industrial experiences that describe significant
advances in the following areas, but are not limited to.
Topics of Interest
 Access Control, Anonymity, Audit and Audit Reduction & Authentication and
Authorization
 Applied Cryptography, Cryptanalysis, Digital Signatures
 Biometric Security
 Boundary Control Devices
 Certification and Accreditation
 Cross-Layer Design for Security
 Data and System Integrity, Database Security
 Defensive Information Warfare
 Denial of Service Protection, Intrusion Detection, Anti-Malware
 Distributed Systems Security
 Electronic Commerce
 Performance Evaluations of Protocols & Security Application
 Privacy and Data Protection
 Product Evaluation Criteria and Compliance
 Risk Evaluation and Security Certification
 Risk/Vulnerability Assessment
 E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection
 Grid Security
 Information Hiding and Watermarking & Information Survivability
 Insider Threat Protection, Integrity
 Intellectual Property Protection
 Internet/Intranet Security
 Key Management and Key Recovery
 Language-based Security
 Mobile and Wireless Security
 Mobile, Ad Hoc and Sensor Network Security
 Monitoring and Surveillance
 Multimedia Security ,Operating System Security, Peer-to-Peer Security
 Security & Network Management
 Security Threats Like DDoS, MiM, Session Hijacking, Replay Attack etc &
Countermeasures
 Trusted Computing
 Ubiquitous Computing Security
 Virtualization Security, VoIP Security, Web 2.0 Security
Paper Submission
Authors are invited to submit papers through the conference Submission System by August
14, 2021. Submissions must be original and should not have been published previously or be
under consideration for publication while being evaluated for this conference. The proceedings
of the conference will be published by Computer Science Conference Proceedings in Computer
Science & Information Technology (CS & IT) series (Confirmed).
Important Dates
Second Batch: (Submissions after July 17, 2021)
 Submission Deadline: August 14, 2021
 Authors Notification: September 11, 2021
 Registration & Camera-Ready Paper Due: September 19, 2021
Contact Us
Here's where you can reach us: csia@iccsea2021.org or csiaconf@yahoo.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (17)

International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
13th International Conference on Network Security & Applications (CNSA 2020)
13th International Conference on Network Security &  Applications (CNSA 2020)13th International Conference on Network Security &  Applications (CNSA 2020)
13th International Conference on Network Security & Applications (CNSA 2020)
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
 
Ijisa
IjisaIjisa
Ijisa
 
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
[CNCF Webinar] Securing Cloud Native Communication, From End User to Service
 

Ähnlich wie 12th International Conference on Communications Security & Information Assurance (CSIA 2021)

Ähnlich wie 12th International Conference on Communications Security & Information Assurance (CSIA 2021) (20)

FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...
 
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
 
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 
11th International Conference on Cryptography and Information Security (CRYP...
11th International Conference on Cryptography and Information  Security (CRYP...11th International Conference on Cryptography and Information  Security (CRYP...
11th International Conference on Cryptography and Information Security (CRYP...
 
International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)International Conference on Cryptography and Blockchain (CRBL 2021)
International Conference on Cryptography and Blockchain (CRBL 2021)
 

Kürzlich hochgeladen

Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 

Kürzlich hochgeladen (20)

Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
MODERN PODCASTING ,CREATING DREAMS TODAY.
MODERN PODCASTING ,CREATING DREAMS TODAY.MODERN PODCASTING ,CREATING DREAMS TODAY.
MODERN PODCASTING ,CREATING DREAMS TODAY.
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazine
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 

12th International Conference on Communications Security & Information Assurance (CSIA 2021)

  • 1. 12th International Conference on Communications Security & Information Assurance (CSIA 2021) November 20 ~ 21, 2021, Zurich, Switzerland https://iccsea2021.org/csia/index Scope 12th International Conference on Communications Security & Information Assurance (CSIA 2021) focuses on all technical and practical aspects of communications security & information assurance for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Topics of Interest  Access Control, Anonymity, Audit and Audit Reduction & Authentication and Authorization  Applied Cryptography, Cryptanalysis, Digital Signatures  Biometric Security  Boundary Control Devices  Certification and Accreditation  Cross-Layer Design for Security  Data and System Integrity, Database Security  Defensive Information Warfare  Denial of Service Protection, Intrusion Detection, Anti-Malware  Distributed Systems Security  Electronic Commerce  Performance Evaluations of Protocols & Security Application  Privacy and Data Protection  Product Evaluation Criteria and Compliance  Risk Evaluation and Security Certification  Risk/Vulnerability Assessment  E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection  Grid Security  Information Hiding and Watermarking & Information Survivability  Insider Threat Protection, Integrity  Intellectual Property Protection  Internet/Intranet Security  Key Management and Key Recovery  Language-based Security  Mobile and Wireless Security  Mobile, Ad Hoc and Sensor Network Security  Monitoring and Surveillance
  • 2.  Multimedia Security ,Operating System Security, Peer-to-Peer Security  Security & Network Management  Security Threats Like DDoS, MiM, Session Hijacking, Replay Attack etc & Countermeasures  Trusted Computing  Ubiquitous Computing Security  Virtualization Security, VoIP Security, Web 2.0 Security Paper Submission Authors are invited to submit papers through the conference Submission System by August 14, 2021. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Important Dates Second Batch: (Submissions after July 17, 2021)  Submission Deadline: August 14, 2021  Authors Notification: September 11, 2021  Registration & Camera-Ready Paper Due: September 19, 2021 Contact Us Here's where you can reach us: csia@iccsea2021.org or csiaconf@yahoo.com