International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience, and exchange and cross-fertilize ideas. In particular, the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms and technologies to IS.
Following the great success of CIS'2005, CIS'2006, and CIS'2007, CIS'2008 serves as a forum for the dissemination of state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS’2008 is co-organized by Southeast University and Soochow University. Also, it is co-sponsored by Guangdong University of Technology, Xidian University, and Harbin Institute of Technology, and in cooperation with IEEE Nanjing Section and IEEE (Hong Kong) Computational Intelligence Chapter. CIS’2008 will be at the Suzhou Dushu Lake Higher Education Town in Suzhou Industrial Park during December 13-17, 2008.
The topics include but are not limited to:
Computational Intelligence:Models, Theories and Algorithms
● Artificial Immune Systems
● Autonomy-Oriented Computing
● Evolutionary Programming
● Particle Swarm Optimization
● Probabilistic Reasoning
● Statistical Data Analysis
● Artificial Neural Systems
● Evolutionary Algorithms
● Multi-Objective Evolutionary Algorithms
● Support Vector Machines
| |
| Information Security
● Access Control
● Block/Stream Ciphers
● Cryptographic Protocols
● Cryptanalysis
● Information, Data and System Integrity
● Information Hiding
● Intrusion Detection
● Malicious Codes
● Mobile Code & Agent Security
● Public Key Cryptosystems
● Secret Sharing
● Security Management
● Steganography and Watermarking
● Authentication and Authorization
● Computer Forensics
● Cryptography and Coding
● Hash Functions
● Information Security Management
● Internet/Intranet Security
● Key/Identity Management
● Mobile Communications Security
● Network & Wireless Security
● Public Key Infrastructure
● Security Analysis Methodologies
● Security Models and Architectures
● Smart/Java Cards
● Zero Knowledge
Applications
● Anti-Virus
● Communication Security
● Content Security
● Cryptography and Its Applications
● Database Security
● Digital Signatures
● Electronic Commerce Security
● Financial Security
● Mobile Device Security
● Software Encryption
● Web Authentication
● Web Security and Integrity
● Biometrics
● Computer Security
● Copyright Protection
● Data Privacy
● Detection of Abnormality
● Distributed Systems Security
● Elliptic Curve Cryptosystems
● Information Discovery
● Multimedia Security
● System Security
● Web Privacy and Trust
|
|
www.xidian.cc