Cryptography
Cryptographic Protocols
Cryptography and Coding
Untraceability
Privacy and Authentication
Key Management
Trust Management
Quantum Cryptography
Computational Intelligence in Security
Artificial Immune Systems
Biological and Evolutionary Computation
Intelligent Agents and Systems
Reinforcement and Unsupervised Learning
Autonomy-Oriented Computing
Co-evolutionary Algorithms
Fuzzy Systems
Biometric Security
Trust Models and Metrics
Regulation and Trust Mechanisms
Data Integrity
Models for Authentication, Trust and Authorization
Wireless Network Security
Information Hiding
E- Commerce
Data and System Integrity



Please send the full paper(word+pdf) to Submission System :
Submitted paper will be peer reviewed by conference committees, and accepted papers after registration and presentation will be published in the Conference Proceedings, which will be submitted for indexing by Ei Compendex, Scopus.