
ICIASM 2020: 14. International Conference on Information Assurance and Security Management
- 会议时间:2020-12-28 至 2020-12-29
- 会议地点: Paris, France,London,United Kingdom 周边酒店预订
发票类型:
不支持开票
参会凭证:其它
Participation Type | Early Registration Fees | Registration Fees |
---|---|---|
Non-Student Oral/Poster Presenter Registration | € 450 | € 500 |
Student Oral/Poster Presenter Registration | € 350 | € 400 |
Listener Registration | € 250 | € 300 |
Additional Paper Publication | € 100 |
The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICIASM 2020: 14. International Conference on Information Assurance and Security Management aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Information Assurance and Security Management. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Information Assurance and Security Management
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters. Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of Information Assurance and Security Management are cordially invited for presentation at the conference. The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.
Please refer to the Paper Submission Guideline, Abstract Submission Guideline and Author Information before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.
Special Journal Issues
ICIASM 2020 has teamed up with the Special Journal Issue on Information Assurance and Security Management. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.
Application Forms
Selected Papers
- A Secure Auditing Framework for Load Balancing in Cloud Environment
R. Geetha, T. Padmavathy - Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card
Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi - The Influence of Interest, Beliefs, and Identity with Mathematics on Achievement
Asma Alzahrani, Elizabeth Stojanovski - Secured Mutual Authentication Protocol for Radio Frequency Identification Systems
C. Kalamani, S. Sowmiya, S. Dheivambigai, G. Harihara Sudhan - Keyloggers Prevention with Time-Sensitive Obfuscation
Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee - The Relationship between the Feeling of Distributive Justice and National Identity of the Youth
Leila Batmany - Authentication of Physical Objects with Dot-Based 2D Code
Michał Glet, Kamil Kaczyński - Data Integrity: Challenges in Health Information Systems in South Africa
T. Thulare, M. Herselman, A. Botha - Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy - Decentralised Edge Authentication in the Industrial Enterprise IoT Space
C. P. Autry, A.W. Roscoe - Survey of Access Controls in Cloud Computing
Monirah Alkathiry, Hanan Aljarwan - Context Aware Anomaly Behavior Analysis for Smart Home Systems
Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu - Harrison’s Stolen: Addressing Aboriginal and Indigenous Islanders Human Rights
M. Shukry - Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh - Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research
Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez
Berg Hyacinthe | Université de Paris II-Assas, FR |
Mohammed Rezaul Karim | Guildhall College, UK |
Poonam Dharam | Saginaw Valley State University, US |
Rajasekhar Chaganti | University of Texas at San Antonio, US |
Douglas Kelly | Johns Hopkins University Applied Physics Laboratory, US |
Glaucio Scremin | University of West Georgia, US |
Yizhen Liu | Research Institue of Huawei at U.S., US |
James Nelson | New Mexico State University, US |
Apurva Mohan | Honeywell Research Labs, US |
Maurice Dawson | Alabama A&M University, US |
Niraj Shakhakarmi | Prairie View A and M University, US |
Guoxiang Liu | University of North Dakota, US |
Danda Rawat | Old Dominion University, US |
Mengyu Qiao | New Mexico Institute of Mining and Technology, US |
Shiping Chen | Sybase, Inc, US |
Fangyang Shen Ali | Northern New Mexico College, US |
Guangzhi Qu | Oakland University, US |
Te - Shun Chou | East Carolina University, US |
Kamal Alezabi | UCSI University, MY |
Dariusz Mikulowski | University of Natural Sciences and Humanities, PL |
Yevgen Kotukh | University of Customs and Finance, UA |
Xiangjun Xin | Zhengzhou University of Light Industry, CN |
Ghassan Kbar | Melbourne Institute of Technology, AU |
Suriakala M. | Government Arts College for Men, IN |
Mehrdad Eftekhar Ardebili | Iran University of Medical Sciences, IR |
Jinghui Peng | University of West London, GB |
Akula V S Giridhar | BS Institute of Technology, IN |
Gihan Abd Elkodous | Arab Academy for Science and Technology and Maritime Transport, EG |
Reza Naghizadeh Majid | Seraj University, IR |
Kamaljit Singh Saini | Chandigarh University, IN |
Abstracts/Full-Text Paper Submission Deadline | November 17, 2020 | |
Notification of Acceptance/Rejection | December 01, 2020 | |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline | November 29, 2020 | |
Conference Dates | December 28-29, 2020 |
- CSI Asia-Pacific 2021
- ICGMFFA 2021: 15. International Conference on Genetically Modified Foods and Food Additives
- ICHPCNA 2021: 15. International Conference on High-Performance Communication Networks and Applications
- ICSTPDM 2021: 15. International Conference on Sludge Treatment Processes and Disposal Methods