Track 11- Advances Intelligent Systems for Information and System Security
Cryptography
Quantum Cryptology
Symmetric and Asymmetric Cryptographic Protocols
Random generators and pseudorandom
Algebraic Cryptanalysis and polynomial systems
hardware implementations and side channel attacks
protocols based on identity or attributes
Intrusion Detection & Prevention
Mobile Security
Smart cards Security
Identity and Security in IoT
Security Policies, Formal methods & verification
Access Control Models
Security, Privacy, Trust infrastructure and technologies
Communication and Information Security
Network Security
Security and Privacy for Smart Systems
Security and privacy for big data
Security architectures
Distributed systems security
Mobile and web security
Cloud Security
Embedded systems security
Web-based Application security
Information Hiding
Steganography
Watermarking
Fingerprinting
Cryptography of algebraic curves
Euclidean networks Based Cryptography
Stream ciphers
