International workshop on Cryptography and Information Security (CRYPIS-2012)
In conjunction with CCSEIT-2012 October 26~28, 2012
Venue : Avinashilingam University, Coimbatore, India.
Home Paper Submission Accepted papers Program Committee Contact Us

Scope & Topics        Call for Participation        Program Schedule        Conference Proceeding     Conference Photos I

This workshop focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Topics of interest include, but are not limited to the following:

  • Cryptographic protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Coevolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission

Authors are invited to submit papers through the conference Submission system ( Track: CRYPIS-2012 )by June 15, 2012. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published.

Selected papers from CRYPIS-2012, after further revisions, will be published in an International Journal (Approval Pending).

Important Dates

  • Submission Deadline : June 15, 2012
  • Authors Notification : July 20, 2012
  • Final Manuscript Due : July 31, 2012