Monday, March 30, 2020
ISC 2017
Conference Tracks

Foundations of cryptology

Foundation of cryptology

Symmetric cryptographic algorithms

Asymmetric and cryptographic algorithms and digital signatures

Hash functions

New methods in cryptography (post-quantum cryptography, functional cryptography, homomorphic cryptography, …

Information theoretic security

Implementation of cryptographic algorithms and related attacks

Software and hardware implementation of cryptographic algorithms

Side channel attacks and countermeasures

Embedded cryptographic systems

Hardware tampering and countermeasures

Cryptographic hardware accelerators

Verification and fault detection of implementations

Network security

Wireless and mobile network security

Security of network infrastructures

Security of network protocols and layers

Intrusion detection and prevention systems

Security of critical infrastructures

Cryptography and security protocols

Authentication and identification protocols

Anonymity, privacy and trust management

Cryptanalysis of security protocols

Trust and security models

Formal methods in information security

Security of computation

Security in computer architecture

Operating system security

Database security

Analysis of security and vulnerability of software and application programs

Security and privacy in mobile devices

Security of cloud computing

Access control

Security of data, systems and applications

Social engineering in security

Information security management system (ISMS)

Information security training

E-business and e-service security

E-health security

E-banking security

E-learning security

Information hiding

New algorithms in steganography and watermarking

Attack modeling and watermarking


Applications of Information hiding

Digital forensics

Digital forensics methods

Database and network forensics

Fraud detection

Tamper detection and prevention

Special topics of ISCISC2018 conference

Cyber security master plan for critical infrastructures (Electricity, Water, Oil & Gas, Transportation)

Common threats and vulnerabilities of industrial control systems

Cost analysis on security of industrial control systems

Native products for securing industrial control systems

Security architecture of industrial control systems

Security of SCADA systems

Standards and best practices in various industries

Industrial Control Systems Training

Cyber Security Programs for high school Students





تاریخ به روز رسانی:
تعداد بازدید:
Copyright @ 2010-2015 Iranian Society of Cryptology. All rights reserved.
Powered by DorsaPortal