posted by user: gblanc || 6844 views || tracked by 14 users: [display]

JWIS 2009 : The fourth Joint Workshop on Information Security

FacebookTwitterLinkedInGoogle

Link: http://jwis2009.nsysu.edu.tw/index.php/jwis/jwis2009/schedConf/cfp
 
When Aug 6, 2009 - Aug 7, 2009
Where Kaohsiung, Taiwan
Submission Deadline May 15, 2009
Notification Due Jun 22, 2009
Final Version Due Jul 9, 2009
Categories    security   sensor networks   biometrics   network security
 

Call For Papers

The fourth Joint Workshop on Information Security (JWIS 2009) will be held in Kaohsiung, Taiwan on August 6-7, 2009. The focus of this workshop is on the technical and practical aspects of the information security applications. The workshop will serve as a forum to present new results from the academic research community as well as from the industry. Original papers are solicited for submission to JWIS 2009. In addition, several distinguished security experts will be invited to give technical talks.

The topics of interest include, but not limited to:

• Network Security

NGN Security, IDS/IPS, Home Network Security, Networked RFID Security,

Sensor Network Security, Telemetric Security, Mobile Internet Security, IPv6

Security, P2P Security, Wireless LAN Security, Ad hoc Network Security

• System Security

Database Security, System Software Security, Secure e-health, Secure

Middleware, Operating System Security, Ubiquitous Security

• Application Security

Anti-SPAM or Combating SPAM, Anti-phishing, Web Services Security (SAML, XACML), VoIP Security

• ID Management and Privacy Controls

• Biometrics

• Security Engineering

• Information Security Management

Human Resource Security

• IT Assurance

• Security Policy

• Security Standards



Important Dates

• Paper submission deadline : May 15, 2009

• Acceptance notification : June 22, 2009

• Proceedings version deadline : July 9, 2009



Instructions for Authors

Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS" (http://www.springer.de/comp/lncs/authors.html) and limited to at most 15 pages in total. Papers must be submitted electronically. Authors of accepted papers must give oral presentation at the workshop.

Related Resources

ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
NECO 2025   14th International Conference of Networks and Communications
ICIMT 2026   2026 16th International Conference on Information and Multimedia Technology (ICIMT 2026)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICIVP 2026   2026 2nd International Conference on Image and Video Processing (ICIVP 2026)
ENERGY 2025   3rd International Conference on Energy
ICISPP 2026   2026 7th International Conference on Information Security and Privacy Protection (ICISPP 2026)
NCWC 2025   11th International Conference of Networks, Communications, Wireless and Mobile Computing
ICISPP--Ei 2026   2026 7th International Conference on Information Security and Privacy Protection (ICISPP 2026)
IJGCA 2025   International Journal of Grid Computing & Applications