Third International Conference on Emerging Security Technologies (EST-2012)
Topics
Technology Fields: • Adaptive methods • Anti-tamper technologies • Autonomous systems • Behavioral biometrics • Bio-inspired technologies • Cancelable biometrics • Cognitive biometrics • Compressive sampling • Computer vision • Cryptography • Decision-making systems • Detection and tracking • Detectors and sensors • Distributed computing • Encryption ciphers • Forensics • Formal verification • Intelligent Systems • Machine learning • Mobile hotspots • Modeling and simulation • Multi-spectral processing • Pattern recognition and classification techniques • Physiological biometrics • Prediction techniques • Probabilistic methods • Reverse engineering • Secure dedicated ASIC • Secure FPGA • Sensor and information fusion • Soft-computing methods • Steganography • System engineering • Trusted ICs
Application Areas: • Air and space security • Crime detection and prevention • Critical infrastructure systems • Cyber-physical security • Cyberspace security • Data center virtualization • Decision support systems • Detection and prevention of identity theft • Digital rights management • Distributed authentication • Early warning systems • Embedded security • Emergency response systems • Financial systems • Geographical information systems (GIS) • Grid and cloud computing • Human-centric systems ID and biometric security • Information hiding • IP protection • Intrusion detection • Medical devices • Mobile computing and infotainment systems • P2P commerce • Perimeter, border and homeland security • Personal and legal records management • Public utilities and transit • Remote sensing, monitoring, surveillance • Tele-healthcare • Training systems • Wireless security
EST-2012 EST-2015 Sixth International Conference on Emerging Security Technologies (EST-2015)
Topics