Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2014), 13-14 March 2014, Trivandrum, India
http://www.iiitmk.ac.in/snds/cis2014.html
With most services and products now being offered through digital communications, new challenges have emerged for cryptology specialists. A Multidisciplinary Perspectives in Cryptology presents a range of topics on the Cryptology methods and safety of information and communication technology. It brings together methods in applied mathematics, computer science, and engineering, telecommunication sciences, physics, chemistry, Digital Signal processing, Error Correcting Codes, information theory, electrical engineering, hardware realization aspects. The session aims to collect the papers oriented towards the introduction on multidisciplinary aspects and their importance in implementation of the new methods and algorithms designed for cryptography, cryptanalysis, and complexity evaluation of the designed algorithms. It improves the ability to process and manage information and knowledge-related processes in order to create new knowledge.
The workshop will aim to provide:
- Comprehensive coverage along with the latest developments in cryptography
- Presentation of many widely used cryptographic algorithms, cryptanalysis algorithms, and complexity evaluation methods that based mainly on multidisciplinary applications within these branches of Cryptology
Call for Papers
The Workshop Organisers invites original and unpublished work from individuals active in the broad theme of the Workshop.The maximum length of the paper is 10 pages (including figures and references). The paper should not contain page numbers or any special headers or footers. The manuscripts should be submitted in PDF format. Authors should submit their papers online. Unregistered authors should first create an account on EDAS to log on.
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.
Recommended topics include, but are not limited to, the following:
- Code Based Cryptography
- Fuzzy Logic Based Cryptology
- Genetic Algorithm Based Cryptology
- Neural Based Cryptology
- Biometric Cryptography
- Chaos Based Cryptology
- Quantum Based Cryptology
- Engineering and Cryptology
- ICA and PCA based Cryptology
- DSP based Cryptology
- Multidisciplinary in Wireless Communication Security
- Multidisciplinary in Information Hiding
- Multidisciplinary in Digital Watermarking
Workshop Organisers
Prof. Dr. Eng. Sattar B. Sadkhan, University of Babylon - IRAQ
E-mail: drengsattar@ieee.org
Dr. Nidaa A. Abbas, Universoity of Babylon - IRAQ
E-mail: drnidaa_muhsin@ieee.org
TPC Members
- Alka Sawlikar, Nagpur University, India
- Anil Dahiya, Manipal University Jaipur, India
- Anitha Kumari, L. B. S Institute of Technology for Women, Trivandrum, India
- Archanaa Rajendran, Amrita Vishwa Vidyapeetham, India
- Arsen Hayrapetyan, KIT, Germany
- Atanu Rakshit, Indian Institute of Management Rohtak, India
- Babu Karuppiah, Velammal College of Engg and Tech, India
- Babu Mehtre, IDRBT - Institute for Development and Research in Banking Technology, India
- Balu Sridevi, VCET, India
- Bhushan Trivedi, GLS Institute of Computer Technology, India
- Chandra Sekaran, National Instittute of Technology Karnataka, India
- Chandra Vorugunti, Dhirubhai Ambani Institute of ICT, India
- Deveshkumar Jinwala, S V National Institute of Technology, India
- Dwijen Rudrapal, National Institute of Technology, Agartala, India
- Gaurav Somani, Central University of Rajasthan, India
- Geethakumari Gopalan Nair, BITS-Pilani, Hyderabad Campus, India
- Gurudatt Kulkarni, Maharashtra State Board of Technical Education, India
- Himanshu Chaurasiya, Amity School of Engineering & Technology, India
- Ilaiah Kavati, IDRBT, India
- Jayaprakash Kar, FCIT, King Abdulaziz University, Saudi Arabia
- Jyothish Lal G, Karpagam Institute of Technology, India
- Kamatchi R, K. J. Somaiya Institute of Management Studies and Research, India
- Latesh Kumar, Siddaganga Institute Technology, India
- Manjula S h, University Visvesvaraya College of Engineering, India
- Marcus Hardt, Karlsruhe Institute of Technology, Germany
- Mrudula Sarvabhatla, Sri Venkateswara University, India
- Musheer Ahmad, Jamia Millia Islamia, New Delhi, India
- Neelam Surti, Gujarat Technological University, India
- Nirmalya Kar, National Institute of Technology Agartala, India
- Prabakaran Poornachandran, Amrita Vishwa Vidyapeetham, India
- Prashant Rewagad, G H Raisoni College of Engineering & Management, India
- Priya Chandran, National Institute of Technology Calicut, India
- Rajat Saxena, Indian Institute of Technology Indore, India
- S Nagarajan, Hindustan University, India
- Saswathi Mukherjee, Anna University, India
- Sudhish George, National Institute of Technology, Calicut, India
- Swapan Debbarma, NIT Agartala, India
- Syed Abbas, Ranchi University, India
- Trilok Chand, PEC University of Technology, India
- Venkitasamy Sureshkumar, PSG College of Technology, India
- Vikas Sihag, Central University of Rajasthan, India
- Vikram Raju R, MIT, Manipal, India
- Yamuna Devi, UVCE, Bangalore, India
Key Dates
Full Paper Submission Ends | November 25, 2013 EST |
Acceptance Notification | December 15, 2013 |
Final paper Deadline | December 31, 2013 |
Author Registration Closes | January 5, 2014 |
Conference | March 13 -14, 2014 |
Contact Us
Email: snds2014.iiitmk@gmail.com