You are on page 1of 2

Fifth International Conference on Cryptography and Information Security

(CRYPIS 2016)
May 28~29, 2016, Sydney, Australia
http://itcse.org/crypis/index.html
Scope and Topics
Fifth International Conference on Cryptography and Information Security (CRYPIS 2016) Conference
focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together
scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography,
coding and Information security.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in the following
areas, but are not limited to

Topics of Interest
Cryptographic protocols

Intrusion

Cryptography and Coding


Untraceability

Privacy and authentication

Key management

Authentication

Trust Management

Quantum cryptography

Computational Intelligence in Security


Artificial Immune Systems

Biological & Evolutionary Computation

Intelligent Agents and Systems


Reinforcement & Unsupervised Learning
Autonomy-Oriented Computing
Coevolutionary Algorithms
Fuzzy Systems
Biometric Security
Trust models and metrics
Regulation and Trust Mechanisms
Data Integrity
Models for Authentication, Trust and

Authorization
Access Control and Intrusion Detection

Detection and Vulnerability


Assessment
Authentication and Non-repudiation
Identification and Authentication
Insider Threats and Countermeasures
Intrusion Detection & Prevention
Secure Cloud Computing
Security Information Systems Architecture
and Design and Security Patterns
Security Management
Security
Requirements
(threats,
vulnerabilities, risk, formal methods,
etc.)
Sensor and Mobile Ad Hoc Network
Security
Service and Systems Design and QoS
Network Security
Software Security
Security and Privacy in Mobile Systems
Security
and
Privacy
in
Pervasive/Ubiquitous Computing
Security and Privacy in Web Sevices
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security for Grid Computing

Security in Distributed Systems

Paper Submission
Authors are invited to submit papers through the Conference Submission System (Track: CRYPIS
2016) by February 06, 2016. Submissions must be original and should not have been published previously
or be under consideration for publication while being evaluated for this conference. The proceedings of
the conference will be published by Computer Science Conference Proceedingsin Computer Science
& InformationTechnology (CS&IT) series(Confirmed).
Selected papers from CRYPIS 2016, after further revisions, will be published in an International Journal
(Approval Pending)
International Journal of Network Security & Its Applications ( IJNSA )
International Journal on Cryptography And Information Security ( IJCIS )
International Journal of Security, Privacy and Trust Management( IJSPTM )

Important Dates
Submission Deadline
: February 06, 2016
Authors Notification
: April 11, 2016
Registration & Camera-Ready Paper Due : April 20, 2016

You might also like