Courtesy Organized by


The Registration fee is 8500 INR (Indian Authors) and 250 USD for International Authors. Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library.

Other Conferences

ACITY 2014
WiMoN 2014
AIAA 2014
DPPR 2014
InWeS 2014
UBIC 2014
NECO 2014

Call for Papers

Call for Participation    Program Schedule I   Program Schedule II
Conference Photos   Conference Proceedings

The Conference focuses on all technical and practical aspects of Communications Security & Information Assurance (CSIA)for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Communication Security & Information assurance

Topics of Interest

  • Access control, Anonymity, Audit and audit reduction & Authentication and authorization
  • Applied cryptography, Cryptanalysis, Digital Signatures
  • Biometric security
  • Boundary control devices
  • Certification and accreditation
  • Cross-layer design for security
  • Data and system integrity, Database security
  • Defensive information warfare
  • Denial of service protection, Intrusion Detection, Anti-malware
  • Distributed systems security
  • Electronic commerce
  • E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection
  • Grid security
  • Information hiding and watermarking & Information survivability
  • Insider threat protection, Integrity
  • Intellectual property protection
  • Internet/Intranet Security
  • Key management and key recovery
  • Language-based security
  • Mobile and wireless security
  • Mobile, Ad Hoc and Sensor Network Security
  • Monitoring and surveillance
  • Multimedia security ,Operating system security, Peer-to-peer security
  • Performance Evaluations of Protocols & Security Application
  • Privacy and data protection
  • Product evaluation criteria and compliance
  • Risk evaluation and security certification
  • Risk/vulnerability assessment
  • Security & Network Management
  • Security and Assurance in Operational, Technological, commercial Area
  • Security Engineering and Its Application
  • Security Models & protocols
  • Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
  • Trusted computing
  • Ubiquitous Computing Security
  • Virtualization security, VoIP security, Web 2.0 security

Paper submission

Authors are invited to submit papers through the  conference Submission system by April 10, 2014. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference.The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from CSIA 2014, after further revisions,will be published in the special issue of the following journal.

Important Dates

Submission Deadline: April 10, 2014
Authors Notification: May 10, 2014
Final Manuscript Due : May 12, 2014