Explore

ISNS 2021

Int'l Conference on Information Security and Network Security (ISNS 2021)

Kunming, China
16 - 18 July 2021
The conference ended on 18 July 2021

Important Dates

Abstract Submission Deadline
16th June 2021

About ISNS 2021

Int'l Conference on Information Security and Network Security (ISNS 2021) will be held from July 16-18, 2021 in Kunming, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields.

Topics

Wireless networks

Call for Papers

Int'l Conference on Information Security and Network Security (ISNS 2021)

Conference Date: July 16-18, 2021

Conference Venue: Kunming, China

Website: https://www.confjuly.org/conference/ISNS2021/

Online Registration System: https://www.confjuly.org/RegistrationSubmission/default.aspx?ConferenceID=1369

Email: intelconf@163.com

Important NOTE: Due to COVID-19 epidemic situation all over the world, most countries still maintain a strict policy of no-gathering, no-entering and leaving the country, and 14-days quarantine. We have to postpone the conference till July 16-18, 2021 in Kunming, China. Please visit the official website to get more details: http://www.confjuly.org/confer...

Int'l Conference on Information Security and Network Security (ISNS 2021) will be held from July 16-18, 2021 in Kunming, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields.

If you wish to serve the conference as an invited speaker, please send email to us with your CV. We'll contact with you asap.

Publication and Presentation

Publication: Open Access Journal, please contact us for detailed information Index: CNKI and Google Scholar Note: If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our Registration System.

Contact Us

Email: intelconf@163.com Tel: +86 132 6470 2250 QQ: 1349406763 WeChat: 3025797047

Attendance Methods

1. Submit full paper (Regular Attendance+Paper Publication+Presentation) You are welcome to submit full paper, all the accepted papers will be published by Open access journal. 2. Submit abstract (Regular Attendance+Abstract+Presentation) 3. Regular Attendance (No Submission Required)

Conference Topics

Access Control Anti-Virus and Anti-Worms Authentication and Authorization Active Defense Systems Adaptive Defense Systems Analysis, Benchmark of Security Systems Biometric Security Complex Systems Security Cryptography Data and System Integrity Database Security Distributed Systems Security Data Protection Electronic Commerce Security Fraud Control Grid Security High Performance Network Virtualization High Performance Security Systems Hardware Security Information Hiding and Watermarking Information Privacy Information Security Engineering Intellectual Property Protection Intrusion Detection Internet and Network Forensics Intrusion Detection and Prevention Key Management and Key Recovery Language-based Security Large-scale Attacks and Defense Network Security Risk Evaluation and Security Certification Security and Privacy for Social Computing Security Evaluation Security for Mobile Computing Security Models Security Protocols Signature and Key Agreement Protocol Software Security System Security Security in Cloud and Grid Systems Security in E-Commerce Security in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grid Security and Privacy in Wireless Networks Secure Mobile Agents and Mobile Code Security Policy Security Protocols Security Simulation and Tools Security Theory and Tools Standards and Assurance Methods Trusted Computing and Trustworthy Computing Technology

Keep Up to Date with PaperCrowd

Sign up and follow your favorite conferences.

We are no longer accepting conference submissions on PaperCrowd. We apologise for any inconvenience.