您好,欢迎登录Mr.confs会先生官方网站!

ICIASM 2020: 14. International Conference on Information Assurance and Security Management

时间:2020-12-28 至 2020-12-29

ICIASM 2020: 14. International Conference on Information Assurance and Security Management
收藏0
ICIASM 2020: 14. International Conference on Information Assurance and Security Management
会议时间:2020-12-28 至 2020-12-29
会议地点: Paris, France,London,United Kingdom 周边酒店预订

发票类型: 不支持开票
参会凭证:其它

门票信息
Participation Type Early Registration Fees Registration Fees
Non-Student Oral/Poster Presenter Registration € 450 € 500
Student Oral/Poster Presenter Registration € 350 € 400
Listener Registration € 250 € 300
Additional Paper Publication € 100
会议介绍

The International Research Conference Aims and Objectives

The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.

ICIASM 2020: 14. International Conference on Information Assurance and Security Management aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Information Assurance and Security Management. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Information Assurance and Security Management

Call for Contributions

Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters. Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of Information Assurance and Security Management are cordially invited for presentation at the conference. The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of novel research materials.

Guidelines for Authors

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission Guideline, Abstract Submission Guideline and Author Information before submitting your paper.

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICIASM 2020 has teamed up with the Special Journal Issue on Information Assurance and Security Management. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Selected Papers

  1. A Secure Auditing Framework for Load Balancing in Cloud Environment
    R. Geetha, T. Padmavathy
  2. Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card
    Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi
  3. The Influence of Interest, Beliefs, and Identity with Mathematics on Achievement
    Asma Alzahrani, Elizabeth Stojanovski
  4. Secured Mutual Authentication Protocol for Radio Frequency Identification Systems
    C. Kalamani, S. Sowmiya, S. Dheivambigai, G. Harihara Sudhan
  5. Keyloggers Prevention with Time-Sensitive Obfuscation
    Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee
  6. The Relationship between the Feeling of Distributive Justice and National Identity of the Youth
    Leila Batmany
  7. Authentication of Physical Objects with Dot-Based 2D Code
    Michał Glet, Kamil Kaczyński
  8. Data Integrity: Challenges in Health Information Systems in South Africa
    T. Thulare, M. Herselman, A. Botha
  9. Security in Resource Constraints Network Light Weight Encryption for Z-MAC
    Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
  10. Decentralised Edge Authentication in the Industrial Enterprise IoT Space
    C. P. Autry, A.W. Roscoe
  11. Survey of Access Controls in Cloud Computing
    Monirah Alkathiry, Hanan Aljarwan
  12. Context Aware Anomaly Behavior Analysis for Smart Home Systems
    Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
  13. Harrison’s Stolen: Addressing Aboriginal and Indigenous Islanders Human Rights
    M. Shukry
  14. Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
    Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
  15. Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research
    Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez
Berg Hyacinthe Université de Paris II-Assas, FR
Mohammed Rezaul Karim Guildhall College, UK
Poonam Dharam Saginaw Valley State University, US
Rajasekhar Chaganti University of Texas at San Antonio, US
Douglas Kelly Johns Hopkins University Applied Physics Laboratory, US
Glaucio Scremin University of West Georgia, US
Yizhen Liu Research Institue of Huawei at U.S., US
James Nelson New Mexico State University, US
Apurva Mohan Honeywell Research Labs, US
Maurice Dawson Alabama A&M University, US
Niraj Shakhakarmi Prairie View A and M University, US
Guoxiang Liu University of North Dakota, US
Danda Rawat Old Dominion University, US
Mengyu Qiao New Mexico Institute of Mining and Technology, US
Shiping Chen Sybase, Inc, US
Fangyang Shen Ali Northern New Mexico College, US
Guangzhi Qu Oakland University, US
Te - Shun Chou East Carolina University, US
Kamal Alezabi UCSI University, MY
Dariusz Mikulowski University of Natural Sciences and Humanities, PL
Yevgen Kotukh University of Customs and Finance, UA
Xiangjun Xin Zhengzhou University of Light Industry, CN
Ghassan Kbar Melbourne Institute of Technology, AU
Suriakala M. Government Arts College for Men, IN
Mehrdad Eftekhar Ardebili Iran University of Medical Sciences, IR
Jinghui Peng University of West London, GB
Akula V S Giridhar BS Institute of Technology, IN
Gihan Abd Elkodous Arab Academy for Science and Technology and Maritime Transport, EG
Reza Naghizadeh Majid Seraj University, IR
Kamaljit Singh Saini Chandigarh University, IN
会议日程
Abstracts/Full-Text Paper Submission Deadline   November 17, 2020
Notification of Acceptance/Rejection   December 01, 2020
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   November 29, 2020
Conference Dates   December 28-29, 2020
参会指南
会议地点
×