Calendar of upcoming scientific conferences

Home | Conference Management System | Conference Listings | Advertise | Contact | About
German French English
You are in: HomeConference ListingsInformatics → Information Security and information privacy in Poland

Conference Management Software

Our Conference Management Software (COMS) can be used for online:

  • registration
  • payment
  • paper submission
  • review process
  • paper selection
  • production of the book of abstracts

Read more ...
Try our demo online

Meetings/Workshops on Information Security and information privacy in Poland offers, as part of our business activities, a directory of upcoming scientific and technical meetings. The calendar is published for the convenience of conference participants and we strive to support conference organisers who need to publish their upcoming events. Although great care is being taken to ensure the correctness of all entries, we cannot accept any liability that may arise from the presence, absence or incorrectness of any particular information on this website. Always check with the meeting organiser before making arrangements to participate in an event!

Meeting organisers can submit meetings free of charge for inclusion into the listing.

1.CSS 2014 — 3rd Conference on Cryptography and Security System
 Dates 22 Sep 2014 → 24 Sep 2014
[ID=614417] Go to top of page
 LocationLublin, Poland
 Abstract In recent years, computer applications and Internet services have been contributing extensively to our life experience and, simultaneously, they are vulnerable and undergo permanent attacks. The objective of the Cryptography and Security System Conference is to present research and developing activities original unpublished results related to all aspects of cryptography and network security. We invite both theoretical, applied research papers, case studies, implementation experiences as well as work-in-progress presentations.
 Topics network security, cryptography and data protection, peer-to-peer security, wireless networks security, security of sensor networks, heterogeneous networks security, privacy-enhancing methods, covert channels, steganography and watermarking for security applications, security of webservices, cryptographic protocols, security as quality of service, quality of protection, data and application security, software security, formal methods in security, trust and reputation models, reputation systems for security applications, intrusion tolerance, system surveillance and enhanced security, cybercrime: threats and countermeasures, Legal constraints of security systems, Risk analysis and management, security models, evaluation, and verification
 Contact Email:
 Related subject(s) Applied Maths: Cryptography and Information Security

View all listed conferences in Poland.

Last updated: 03 March 2014