The 2nd Conference on Information Security (CIS 2015) is dedicated to information Security.
The 2nd Conference on Information Security (CIS 2015) covers topics such as:
- Access Control
- Authentication and Authorization
- Anti-Virus and Anti-Worms
- Cryptography
- Biometric Security
- Database Security
- Data and System Integrity
- Electronic Commerce Security
- Distributed Systems Security
- Grid Security
- Fraud Control
- Information Privacy
- Information Hiding and Watermarking
- Intellectual Property Protection
- Information Security Engineering
- Key Management and Key Recovery
- Intrusion Detection
- Network Security
- Language-based Security
- Risk Evaluation and Security Certification
- Operating System Security
- Security Evaluation
- Security and Privacy for Social Computing
- Security Models
- Security for Mobile Computing
- Signature and Key Agreement Protocol
- Security Protocols
- System Security
- Software Security
- Trusted Computing and Trustworthy Computing Technology