posted by user: To7_ || 2371 views || tracked by 11 users: [display]

ITS 2010 : International Conference on Information Technology Security

FacebookTwitterLinkedInGoogle

Link: http://www.itsecurityconf.org/
 
When Nov 29, 2010 - Nov 30, 2010
Where Phuket Beach Resort, Thailand
Submission Deadline Oct 7, 2010
Notification Due Oct 12, 2010
Categories    information technology   computer science
 

Call For Papers

FIRM DEADLINE(7 Oct): ITS 2010 CALL FOR PAPERS

Annual International Conference on Information Technology Security
http://www.itsecurityconf.org/

Date: 29-30 November 2010
Venue: Phuket Beach Resort, Thailand


[HIGHLIGHTS]

•The conference proceedings will be indexed by / included in CiteSeerX, SCIrus, Google Scholar, getCITED and EBSCO. In addition, they will be submitted to IEEE xplore, ACM Digital Library, EI Compendex, and ISTP for indexing/inclusion subject to acceptance / approval.

•Selected papers will be published in GSTF International Journal on Computing (JoC) and GSTF associated journals subject to extension/acceptance.

•Best Paper Awards and Best Student Paper Awards will be conferred at the conference (in order to qualify for the award, the paper must be presented at the conference).

[TOPICS]

Topics of interests include, but are not limited to:

•Security of Web-based applications and services
•Anti-malware techniques: detection, analysis, and prevention
•Intrusion prevention, detection, and response
•Security for electronic voting
•Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
•Privacy and anonymity technologies
•Network perimeter controls: firewalls, packet filters, and application gateways
•Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
•Security for Vehicular Ad-hoc Networks (VANETs)
•Security for peer-to-peer and overlay network systems
•Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
•Implementation, deployment and management of network security policies
•Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
•Integrating security services with system and application security facilities and protocols
•Public key infrastructures, key management, certification, and revocation
•Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
•Security for collaborative applications: teleconferencing and video-conferencing
•Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
•Security for large-scale systems and critical infrastructures
•Integrating security in Internet protocols: routing, naming, network management


[CONFERENCE CHAIR]

Prof. Stephen Martin
Former Deputy Vice Chancellor, Curtin University of Technology
Former Pro Vice Chancellor International, Victoria University
Former Speaker, Parliament of Australia


[PROGRAM CO-CHAIRS]

Prof. P.K. Kapur
Head, Department of Operational Research, Dean, Faculty of Mathematical Science, University of Delhi

Dr. Xu Wang
School of Engineering and Physical Sciences, Heriot Watt University, United Kingdom


[EDITOR-IN-CHIEF]

Prof. A. S. M. Sajeev
Chair of IT/Computer Science, University of New England, Armidale, Australia


[PROGRAM COMMITTEE]

Prof. Bharat Bhargava
Purdue University, USA

Prof. Selwyn Piramuthu
University of Florida, USA

Assoc. Prof. Ofer Zwikael
The Australian National University Canberra, Australia

Prof. SH (Basie) von Solms
University of Johannesburg, South Africa

Prof. Margaret Tan
Nanyang Technological University Singapore, Singapore

Assoc. Prof. Junbin Gao
Charles Sturt University, Australia

Dr. Udayan Chanda
Asia-Pacific Institute of Management, Delhi, India

Dr. Youngjae Kim
Oak Ridge National Laboratory (ORNL), Knoxville, TN, USA

Asst. Prof Di Ma
University of Michigan, Dearborn, USA

Peter Palensky
Austrian Institute of Technology (AIT)

Dr. Wan D. Bae
University of Wisconsin-Stout, USA


[IMPORTANT DATES]

Paper Submission Deadline(Firm) 07 Oct 2010
Notification of Paper Acceptance 12 Oct 2010
Deadline for Early-Bird Registration 01 Nov 2010
Deadline for Late Registration* 19 Nov 2010
Conference Dates 29-30 Nov 2010


[CONTACT INFORMATION]

Website : www.itsecurityconf.org/
Email : info@itsecurityconf.org
DID : +65 6327 0166/161
FAX : +65 6327 0162

Related Resources

ACMC 2017   Australasian Computer Music Conference
TheWebConf 2018   The Web Conference (The International World Wide Web Conference - WWW2018)
eCrime 2018   13th Symposium on Electronic Crime Research
ICITA 2018   International Conference on Information Technology and Applications
ICASSP 2018   IEEE International Conference on Acoustics, Speech and Signal Processing
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
SIGI 2017   3rd International Conference on Signal and Image Processing
ICISIP 2018   The 6th IIAE International Conference on Intelligent Systems and Image Processing 2018
IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications