حاميان کنفرانس
     

جستجو
     


ورود به سیستم
     






 ارسال مجدد ایمیل تایید؟

 آيا کلمه عبور خود را فراموش کرده ايد؟

 کاربر جدید هستید؟ ثبت نام کنید.

   

ISCISC 2011 Topics

Fundamentals of Cryptology

Fundamentals of Cryptography

Information Hiding

Information Hiding Algorithms (Steganography, Watermarking, Covert, Channel, …)

Private Key Encryption Algorithms

Analysis and Evaluation

Public Key Encryption Algorithms

Implementation and applications to hide information

Cryptanalysis and Evaluation

Cryptography & Security Protocols

Authorization, Identification and Authentication

Cryptography function (Hashing, Authenticity Verification Code, …)

Privacy and Anonymity

Implementation of Cryptograpy Algorithms

Hardware Implementation Cryptography Algorithms

Availability

Software Implementation Cryptography Algorithms

Access Control and Trust Management

Embedded System Cryptography

Formal Methods in Information Security

Security of Systems & Applications

Operating System Security

Security Management

Vulnerabilities & Penetration Test

Database Security

Secure Software Engineering / Software Security

Network Security

Social Engineering & Security

E-Business Security

ISMS

Security in New Computational Environments

Security Training

Auditing, Intrusion Detection & Prevention

Other Related Topics


فهرست اصلي
     

Select Language
     

پیوندها
     

Home Page | About us | Contact us | Site Map 

  تعداد بازدید کنندگان : 730848
©2011 Ferdowsi University Of Mashhad.