Conference Date: July 17-19, 2020 Conference Venue: Kunming, China Website: https://www.confjuly.org/conference/ISNS2020/ Online Registration System: http://www.confjuly.org/RegistrationSubmission/default.aspx?ConferenceID=1243 Email: intelconf@163.com
Int'l Conference on Information Security and Network Security (ISNS 2020) will be held from July 17-19, 2020 in Kunming, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields.  
If you wish to serve the conference as an invited speaker, please send email to us with your CV. We'll contact with you asap.
Publication and Presentation
Publication: Open Access Journal,please contact us for detailed information Index: CNKI and Google Scholar Note: If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our Registration System.
Contact Us
Email: intelconf@163.com Tel: +86 132 6470 2250 QQ: 1349406763, 3025797047 WeChat: 3025797047
Attendance Methods
1.Submit full paper (Regular Attendance+Paper Publication+Presentation) You are welcome to submit full paper, all the accepted papers will be published by Open access journal. 2. Submit abstract (Regular Attendance+Abstract+Presentation) 3. Regular Attendance (No Submission Required) 
Conference Topics
Access Control Anti-Virus and Anti-Worms Authentication and Authorization Active Defense Systems Adaptive Defense Systems Analysis, Benchmark of Security Systems Biometric Security Complex Systems Security Cryptography Data and System Integrity Database Security Distributed Systems Security Data Protection Electronic Commerce Security Fraud Control Grid Security High Performance Network Virtualization High Performance Security Systems Hardware Security Information Hiding and Watermarking Information Privacy Information Security Engineering Intellectual Property Protection Intrusion Detection Internet and Network Forensics Intrusion Detection and Prevention Key Management and Key Recovery Language-based Security Large-scale Attacks and Defense Network Security Risk Evaluation and Security Certification Security and Privacy for Social Computing Security Evaluation Security for Mobile Computing Security Models Security Protocols Signature and Key Agreement Protocol Software Security System Security Security in Cloud and Grid Systems Security in E-Commerce Security in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grid Security and Privacy in Wireless Networks Secure Mobile Agents and Mobile Code Security Policy Security Protocols Security Simulation and Tools Security Theory and Tools Standards and Assurance Methods Trusted Computing and Trustworthy Computing Technology

This website uses cookies. By continuing to browse you agree to this and Conferize's terms of service.