Topics

Foundations of cryptology

Foundation of cryptology

Symmetric cryptographic algorithms

Asymmetric and cryptographic algorithms and digital signatures

Hash functions

New methods in cryptography (post-quantum cryptography, functional cryptography, homomorphic cryptography, …

Information theoretic security

 

Implementation of cryptographic algorithms and related attacks

Software and hardware implementation of cryptographic algorithms

Side channel attacks and countermeasures

Embedded cryptographic systems

Hardware tampering and countermeasures

Cryptographic hardware accelerators

Verification and fault detection of implementations

 

Network security

Wireless and mobile network security

Security of network infrastructures

Security of network protocols and layers

Intrusion detection and prevention systems

Security of critical infrastructures

 

Cryptography and security protocols

Authentication and identification protocols

Anonymity, privacy and trust management

Cryptanalysis of security protocols

Trust and security models

Formal methods in information security

 

Security of computation

Security in computer architecture

Operating system security

Database security

Analysis of security and vulnerability of software and application programs

Security and privacy in mobile devices

Security of cloud computing

Access control

 

Security of data, systems and applications

Social engineering in security

Information security management system (ISMS)

Information security training

E-business and e-service security

E-health security

E-banking security

E-learning security

 

Information hiding

New algorithms in steganography and watermarking

Attack modeling and watermarking

Steganalysis

Applications of Information hiding

 

Digital forensics

Digital forensics methods

Database and network forensics

Fraud detection

Tamper detection and prevention

Special topics of ISCISC2019 conference

Security Regulations for Industrial Control Systems (For Persian Papers)

Cyber security master plan for critical infrastructures (Electricity, Water, Oil & Gas, Transportation)

Common threats and vulnerabilities of industrial control systems

Cost analysis on security of industrial control systems

Native products for securing industrial control systems

Security architecture of industrial control systems

Security of SCADA systems

Standards and best practices in various industries

Security for the Internet of Things (IoT) (For Persian Papers)

 

 

 

 

ورود


reload