BugTraq
Call for Papers, 2014 Symposium on Cryptography and Authentication (SCA2014) , Suzhou, China Oct 27 2013 05:56PM
2014 Symposium on Cryptography and Authentication \(SCA2014\) (cis so1 org)
<span id="unSub" style="FONT-SIZE: 10pt; FONT-FAMILY: verdana,arial,helvetica,sans-serif; line-height:20px;">This message was sent to [bugtraq (at) securityfocus (dot) com [email concealed]]. <a href="http://www.member.scirp.org/member/transferParameterAction.action?
personID=7835691&identifier=5DFD5F85E4BE67FA9AE938BDE3C7410710FCD66EAA0F
449D8C622F82188A7DE0&blackListTypeId=3" target="_blank">Unsubscribe</a></span><br/><span id="showTem" style="FONT-SIZE: 10pt; FONT-FAMILY: verdana,arial,helvetica,sans-serif; line-height:20px;"> If you cannot read it, please click <a href="http://edm.scirp.org/template/showTemplateInfo?showId=4794&personN
ame=" target="_blank">here</a>.</span><html>
<head></head>
<body>
<table style="border-bottom:#5f712d 1px solid;border-left:#5f712d 1px solid;border-top:#5f712d 1px solid;border-right:#5f712d 1px solid;" class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" width="600">
<tbody>
<tr>
<td style="padding-bottom:0px;padding-left:18px;padding-right:18px;padding-t
op:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica, sans-serif;color:#ff9966;font-size:24px;" align="center"><strong>Call for Papers </strong></td>
</tr>
<tr>
<td style="font-family:Arial, Helvetica, sans-serif;color:#ff9966;font-size:24px;" align="center"><strong>2014 Symposium on Cryptography and Authentication (SCA2014) </strong></td>
</tr>
<tr>
<td style="font-family:Arial, Helvetica, sans-serif;color:#ff9966;font-size:13pt;" align="right"> <p align="center">Submission Due: Nov. 27, 2013    Conference: March 10-12, 2014</p></td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-t
op:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica, sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" height="24"><strong>Dear Colleagues,</strong> </td>
</tr>
<tr>
<td style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right
:0px;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"> We would like to cordially invite you to submit or recommend papers to 2014 Symposium on Cryptography and Authentication (SCA2014)! This conference will be held from March 10 to 12, 2014 in Suzhou, China. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. More detailed information can be found at <a target="_blank" href="http://www.engii.org/workshop/CIS2014March/Home.aspx?utm_campaign=
sca&utm_source=e_cp&utm_medium=e_cp_conf_ws_sca_20131023">www.en
gii.org/workshop/CIS2014March</a>. </td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-t
op:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica, sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" height="24" colspan="2"><strong>Related Topics (more can be found in our website) </strong></td>
</tr>
<tr>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Anti-Virus and Anti-Worms</td>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Key Management and Key Recovery</td>
</tr>
<tr>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Database Security</td>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Language-based Security</td>
</tr>
<tr>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Distributed Systems Security</td>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Security Evaluation</td>
</tr>
<tr>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Electronic Commerce Security</td>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Security for Mobile Computing</td>
</tr>
<tr>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Fraud Control</td>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Security Models</td>
</tr>
<tr>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Information Security Engineering</td>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ System Security</td>
</tr>
<tr>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Information Privacy</td>
<td style="padding-bottom:5px;padding-left:0px;padding-right:0px;font-family
:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:5px;" class="td2"> â?¢ Signature and Key Agreement Protocol</td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td style="padding-bottom:0px;padding-left:18px;padding-right:18px;padding-t
op:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica, sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" height="24"><strong>Technical Program Committee </strong></td>
</tr>
<tr>
<td style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right
:0px;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"><p> <b>Prof. Fagen Li</b>, University of Electronic Science and Technology of China<br /> <b>Prof. Xiaochun Cheng</b>, Middlesex University<br /> <b>Prof. Vic Grout</b>, Glyndwr University<br /> <b>Prof. Giannis F. Marias</b>, Athens University of Economics and Business<br /> <b>Prof. Stavros D. Nikolopoulos</b>, University of Ioannina<br /> <a target="_blank" href="http://www.engii.org/workshop/CIS2014March/OrganizingCommittee.asp
x?utm_campaign=sca&utm_source=e_cp&utm_medium=e_cp_conf_ws_sca_2
0131023"> >>More </a></p></td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td style="padding-bottom:9px;padding-left:18px;padding-right:18px;padding-t
op:9px;">
<table class="ke-zeroborder" border="0" cellspacing="0" cellpadding="0" width="100%">
<tbody>
<tr>
<td style="font-family:Arial, Helvetica, sans-serif;color:#ffffff;font-size:17px;" bgcolor="#ff9966" height="24"><strong>Publication and Presentation</strong></td>
</tr>
<tr>
<td style="padding-bottom:9px;line-height:1.4;padding-left:0px;padding-right
:0px;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padding-top:9px;"> All the accepted papers will be published by "Journal of Computer and Communications" (ISSN:2327-5219), a peer-reviewed open access journal that can ensure the widest dissemination of your published work.<br /><br /> If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our <a target="_blank" href="http://www.engii.org/Workshop2014/MarchSubmission/index.aspx?utm_c
ampaign=sca&utm_source=e_cp&utm_medium=e_cp_conf_ws_sca_20131023
">Registration System</a>. </td>
</tr>
</tbody>
</table></td>
</tr>
<tr>
<td style="padding-bottom:5px;padding-left:18px;padding-right:18px;padding-t
op:0px;">
<table width="100%">
<tbody>
<tr>
<td style="border-bottom:#666666 2px solid;padding-bottom:5px;padding-left:0px;padding-right:0px;font-family:
Trebuchet MS,Arial,'TradeGothic-CondEighteen',Arial,Helvetica,sans-serif;color:#33
3333;font-size:13pt;font-weight:bold;padding-top:4px;" class="td">Yours sincerely,</td>
</tr>
<tr>
<td style="padding-bottom:0px;padding-left:0px;padding-right:0px;font-family
:'TradeGothic-CondEighteen',Arial,Helvetica,sans-serif;color:#333333;fon
t-size:17px;padding-top:0px;" class="td2"> SCA Organizing Committee<br /> Email: CIS (at) engii (dot) org [email concealed]<br /> Tel : +86- 132 6470 2230</td>
</tr>
</tbody>
</table></td>
</tr>
</tbody>
</table>
</body>
</html><img id="openURL" src="http://www.member.scirp.org/emailopen/doSaveLogAction.action?email=
bugtraq (at) securityfocus (dot) com [email concealed]&personId=7835691&taskId=3426" style="display:none;width:1px;height:1px;">

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus