lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4E245D52.3050504@gmail.com>
Date: Mon, 18 Jul 2011 19:20:34 +0300
From: Call for papers <call.for.papers.is@...il.com>
To: destinataires inconnus: ;
Subject: Call for Papers: ICITST-2011


Apologies for cross-postings. Please send it to interested colleagues 
and students. Thanks!

CALL FOR PAPERS

***********************************************************************************************
The 6th International Conference for Internet Technology and Secured 
Transactions (ICITST-2011)
December 11-14, 2011, Abu Dhabi, UAE (www.icitst.org)
***********************************************************************************************

The 6th International Conference for Internet Technology and Secured 
Transactions (ICITST-2011) is Technical Co-sponsored by IEEE UAE 
Computer Chapter. The ICITST is an international refereed conference 
dedicated to the advancement of the theory and practical implementation 
of secured Internet transactions and to fostering discussions on 
information technology evolution. The ICITST aims to provide a highly 
professional and comparative academic research forum that promotes 
collaborative excellence between academia and industry.

The objectives of the ICITST are to bridge the knowledge gap between 
academia and industry, promote research esteem in secured Internet 
transactions and the importance of information technology evolution to 
secured transactions. The ICITST-2011 invites research papers that 
encompass conceptual analysis, design implementation and performance 
evaluation.

All the accepted papers will appear in the proceedings published by IEEE 
and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP.

The topics in ICITST-2011 include but are not confined to the following 
areas:

Internet Application and Technology

     Internet technologies
     Internet Architecture
     Internet of things
     Broadband Access Technologies
     Application Agents
     Boundary Issues of Internet Security
     Database Management
     Data Models for Production Systems and Services
     Artificial Intelligence and Expert Systems
     IPSec Quality of Service
     Knowledge Management
     Embedded Systems
     Defence Systems

Infonomics and e-Technology

     Infonomics
     Information Visualization
     Information Management
     Information Quality
     Technology-Enabled Information
     e-Learning
     e-Commerce
     e-Business
     e-Government
     e-Society
     System Design and Security for e-Services
     Synchronizing e-Security


Information Security

     Collaborative Learning
     Trust, Privacy and Data Security
     Network Security Issues and Protocols
     Security Challenges and Content Authoring
     Cryptography
     Secure Communications
     Authentication Techniques
     Chaos-based Data Security
     MANET Security
     Wireless Sensor Network Security
     Organization Considerations in Security Policy Formulation and 
Implementations
     Digital Forensics and Crimes
     Biometrics
     Cyber Security

Multimedia and Web Services

     Intelligent Multimedia and its Data Management
     Multimedia Information Systems
     Multimedia Security
     Web Databases
     Web Metrics and its Applications
     Web Mining including Web Intelligence and Web 3.0.
     Web Services
     XML and other extensible languages
     Semantic Web and Ontology



Ubi/Cloud Computing

     Authentication and Access Control for Data Protection in Ubi/Cloud 
Computing
     Context-Awareness and its Data Mining for UbiCom
     Data Grids
     Distributed Information Systems
     Human-Computer Interface and Interaction for UbiCom
     Ubiquitous Systems
     USN/RFID Service
     Smart Homes and its Business Model for UbiCom Service
     Security and its Data Management for UbiCom
     Peer to Peer Data Management
     New Novel Mechanism and Application for Ubi/Cloud Computing

Research in Progress

     Ongoing research from undergraduates, graduates/postgraduates and 
professionals
     Projects
     Collaborative Research


Important dates

Full Paper Submission Date                August 26, 2011
Extended Abstract (Work in Progress) Submission Date     July 31, 2011
Proposal for Workshops and Tutorials                    May 31, 2011
Notification of Workshop and Tutorial Acceptance        June 05, 2011
Proposal for Industrial Presentation             April 30, 2011
Notification of Extended Abstract Acceptance/Rejection     August 15, 2011
Notification of Industrial Presentation Acceptance    May 10, 2011
Notification of Paper Acceptance/Rejection        September 30, 2011
Camera Ready Extended Abstract Due            August 31, 2011
Camera Ready Paper Due                    October 14, 2011
Early Registration Deadline (Authors only)        May 01 to September 
30, 2011
Late Registration Deadline (Authors only)         October 01 to November 
15, 2011
Participants Registration                 May 01 to December 01, 2011
Conference Dates                    December 11-14, 2011



For more information please contact: info@...tst.org




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ