posted by user: To7_ || 2486 views || tracked by 11 users: [display]

ITS 2010 : International Conference on Information Technology Security


When Nov 29, 2010 - Nov 30, 2010
Where Phuket Beach Resort, Thailand
Submission Deadline Oct 7, 2010
Notification Due Oct 12, 2010
Categories    information technology   computer science

Call For Papers


Annual International Conference on Information Technology Security

Date: 29-30 November 2010
Venue: Phuket Beach Resort, Thailand


•The conference proceedings will be indexed by / included in CiteSeerX, SCIrus, Google Scholar, getCITED and EBSCO. In addition, they will be submitted to IEEE xplore, ACM Digital Library, EI Compendex, and ISTP for indexing/inclusion subject to acceptance / approval.

•Selected papers will be published in GSTF International Journal on Computing (JoC) and GSTF associated journals subject to extension/acceptance.

•Best Paper Awards and Best Student Paper Awards will be conferred at the conference (in order to qualify for the award, the paper must be presented at the conference).


Topics of interests include, but are not limited to:

•Security of Web-based applications and services
•Anti-malware techniques: detection, analysis, and prevention
•Intrusion prevention, detection, and response
•Security for electronic voting
•Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
•Privacy and anonymity technologies
•Network perimeter controls: firewalls, packet filters, and application gateways
•Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
•Security for Vehicular Ad-hoc Networks (VANETs)
•Security for peer-to-peer and overlay network systems
•Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
•Implementation, deployment and management of network security policies
•Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
•Integrating security services with system and application security facilities and protocols
•Public key infrastructures, key management, certification, and revocation
•Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
•Security for collaborative applications: teleconferencing and video-conferencing
•Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
•Security for large-scale systems and critical infrastructures
•Integrating security in Internet protocols: routing, naming, network management


Prof. Stephen Martin
Former Deputy Vice Chancellor, Curtin University of Technology
Former Pro Vice Chancellor International, Victoria University
Former Speaker, Parliament of Australia


Prof. P.K. Kapur
Head, Department of Operational Research, Dean, Faculty of Mathematical Science, University of Delhi

Dr. Xu Wang
School of Engineering and Physical Sciences, Heriot Watt University, United Kingdom


Prof. A. S. M. Sajeev
Chair of IT/Computer Science, University of New England, Armidale, Australia


Prof. Bharat Bhargava
Purdue University, USA

Prof. Selwyn Piramuthu
University of Florida, USA

Assoc. Prof. Ofer Zwikael
The Australian National University Canberra, Australia

Prof. SH (Basie) von Solms
University of Johannesburg, South Africa

Prof. Margaret Tan
Nanyang Technological University Singapore, Singapore

Assoc. Prof. Junbin Gao
Charles Sturt University, Australia

Dr. Udayan Chanda
Asia-Pacific Institute of Management, Delhi, India

Dr. Youngjae Kim
Oak Ridge National Laboratory (ORNL), Knoxville, TN, USA

Asst. Prof Di Ma
University of Michigan, Dearborn, USA

Peter Palensky
Austrian Institute of Technology (AIT)

Dr. Wan D. Bae
University of Wisconsin-Stout, USA


Paper Submission Deadline(Firm) 07 Oct 2010
Notification of Paper Acceptance 12 Oct 2010
Deadline for Early-Bird Registration 01 Nov 2010
Deadline for Late Registration* 19 Nov 2010
Conference Dates 29-30 Nov 2010


Website :
Email :
DID : +65 6327 0166/161
FAX : +65 6327 0162

Related Resources

SECITC 2018   11th International Conference on Security for Information Technology and Communications
GreeNet Symposium - SGNC 2018   9th Symposium on Green Networking and Computing (SGNC 2018)
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
ACII 2018   Advanced Computational Intelligence: An International Journal
ICNS--Ei Compendex and Scopus 2018   2018 The 3rd International Conference on Network Security (ICNS 2018)--Ei Compendex and Scopus
IJMVSC 2018   The International Journal of Managing Value and Supply Chains
DISC 2018   Special Issue on Data Intelligence in Sustainable Computing, Journal of Sustainable Computing: Informatics and Systems
ICISIP 2018   The 6th IIAE International Conference on Intelligent Systems and Image Processing 2018
ICCC--IEEE, Ei Compendex and Scopus 2018   2018 4th IEEE International Conference on Computer and Communications (ICCC 2018)--Ei Compendex and Scopus
IJIST 2018   The International Journal of Information Science & techniques