Topics
|
Foundations of cryptology |
|
Foundation of cryptology |
|
Symmetric cryptographic algorithms |
|
Asymmetric and cryptographic algorithms and digital signatures |
|
Hash functions |
|
New methods in cryptography (post-quantum cryptography, functional cryptography, homomorphic cryptography, … |
|
Information theoretic security |
|
Implementation of cryptographic algorithms and related attacks |
|
Software and hardware implementation of cryptographic algorithms |
|
Side channel attacks and countermeasures |
|
Embedded cryptographic systems |
|
Hardware tampering and countermeasures |
|
Cryptographic hardware accelerators |
|
Verification and fault detection of implementations |
|
Network security |
|
Wireless and mobile network security |
|
Security of network infrastructures |
|
Security of network protocols and layers |
|
Intrusion detection and prevention systems |
|
Security of critical infrastructures |
|
Cryptography and security protocols |
|
Authentication and identification protocols |
|
Anonymity, privacy and trust management |
|
Cryptanalysis of security protocols |
|
Trust and security models |
|
Formal methods in information security |
|
Security of computation |
|
Security in computer architecture |
|
Operating system security |
|
Database security |
|
Analysis of security and vulnerability of software and application programs |
|
Security and privacy in mobile devices |
|
Security of cloud computing |
|
Access control |
|
Security of data, systems and applications |
|
Social engineering in security |
|
Information security management system (ISMS) |
|
Information security training |
|
E-business and e-service security |
|
E-health security |
|
E-banking security |
|
E-learning security |
|
Information hiding |
|
New algorithms in steganography and watermarking |
|
Attack modeling and watermarking |
|
Steganalysis |
|
Applications of Information hiding |
|
Digital forensics |
|
Digital forensics methods |
|
Database and network forensics |
|
Fraud detection |
|
Tamper detection and prevention |
|
Special topics of ISCISC2019 conference |
|
Security Regulations for Industrial Control Systems (For Persian Papers) |
|
Cyber security master plan for critical infrastructures (Electricity, Water, Oil & Gas, Transportation) |
|
Common threats and vulnerabilities of industrial control systems |
|
Cost analysis on security of industrial control systems |
|
Native products for securing industrial control systems |
|
Security architecture of industrial control systems |
|
Security of SCADA systems |
|
Standards and best practices in various industries |
|
Security for the Internet of Things (IoT) (For Persian Papers) |
|
|
- Hits: 2003

