posted by user: To7_ || 2570 views || tracked by 11 users: [display]

ITS 2010 : International Conference on Information Technology Security

FacebookTwitterLinkedInGoogle

Link: http://www.itsecurityconf.org/
 
When Nov 29, 2010 - Nov 30, 2010
Where Phuket Beach Resort, Thailand
Submission Deadline Oct 7, 2010
Notification Due Oct 12, 2010
Categories    information technology   computer science
 

Call For Papers

FIRM DEADLINE(7 Oct): ITS 2010 CALL FOR PAPERS

Annual International Conference on Information Technology Security
http://www.itsecurityconf.org/

Date: 29-30 November 2010
Venue: Phuket Beach Resort, Thailand


[HIGHLIGHTS]

•The conference proceedings will be indexed by / included in CiteSeerX, SCIrus, Google Scholar, getCITED and EBSCO. In addition, they will be submitted to IEEE xplore, ACM Digital Library, EI Compendex, and ISTP for indexing/inclusion subject to acceptance / approval.

•Selected papers will be published in GSTF International Journal on Computing (JoC) and GSTF associated journals subject to extension/acceptance.

•Best Paper Awards and Best Student Paper Awards will be conferred at the conference (in order to qualify for the award, the paper must be presented at the conference).

[TOPICS]

Topics of interests include, but are not limited to:

•Security of Web-based applications and services
•Anti-malware techniques: detection, analysis, and prevention
•Intrusion prevention, detection, and response
•Security for electronic voting
•Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
•Privacy and anonymity technologies
•Network perimeter controls: firewalls, packet filters, and application gateways
•Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
•Security for Vehicular Ad-hoc Networks (VANETs)
•Security for peer-to-peer and overlay network systems
•Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
•Implementation, deployment and management of network security policies
•Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
•Integrating security services with system and application security facilities and protocols
•Public key infrastructures, key management, certification, and revocation
•Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
•Security for collaborative applications: teleconferencing and video-conferencing
•Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
•Security for large-scale systems and critical infrastructures
•Integrating security in Internet protocols: routing, naming, network management


[CONFERENCE CHAIR]

Prof. Stephen Martin
Former Deputy Vice Chancellor, Curtin University of Technology
Former Pro Vice Chancellor International, Victoria University
Former Speaker, Parliament of Australia


[PROGRAM CO-CHAIRS]

Prof. P.K. Kapur
Head, Department of Operational Research, Dean, Faculty of Mathematical Science, University of Delhi

Dr. Xu Wang
School of Engineering and Physical Sciences, Heriot Watt University, United Kingdom


[EDITOR-IN-CHIEF]

Prof. A. S. M. Sajeev
Chair of IT/Computer Science, University of New England, Armidale, Australia


[PROGRAM COMMITTEE]

Prof. Bharat Bhargava
Purdue University, USA

Prof. Selwyn Piramuthu
University of Florida, USA

Assoc. Prof. Ofer Zwikael
The Australian National University Canberra, Australia

Prof. SH (Basie) von Solms
University of Johannesburg, South Africa

Prof. Margaret Tan
Nanyang Technological University Singapore, Singapore

Assoc. Prof. Junbin Gao
Charles Sturt University, Australia

Dr. Udayan Chanda
Asia-Pacific Institute of Management, Delhi, India

Dr. Youngjae Kim
Oak Ridge National Laboratory (ORNL), Knoxville, TN, USA

Asst. Prof Di Ma
University of Michigan, Dearborn, USA

Peter Palensky
Austrian Institute of Technology (AIT)

Dr. Wan D. Bae
University of Wisconsin-Stout, USA


[IMPORTANT DATES]

Paper Submission Deadline(Firm) 07 Oct 2010
Notification of Paper Acceptance 12 Oct 2010
Deadline for Early-Bird Registration 01 Nov 2010
Deadline for Late Registration* 19 Nov 2010
Conference Dates 29-30 Nov 2010


[CONTACT INFORMATION]

Website : www.itsecurityconf.org/
Email : info@itsecurityconf.org
DID : +65 6327 0166/161
FAX : +65 6327 0162

Related Resources

DICTAP 2019   The 9th International Conference on Digital Information and Communication Technology and its Applications
IJIST 2018   The International Journal of Information Science & techniques
ICITA 2019   International Conference on Information Technology and Applications
ICBCT--EI and Scopus 2019   2019 International Conference on Blockchain Technology (ICBCT 2019)--EI Compendex and Scopus
IJMPICT 2018   International Journal of Managing Public Sector Information and Communication Technologies
ISCSAI 2018   2018 International Symposium on Computer Science and Artificial Intelligence
SCSN 2019   International Workshop on Semantic Computing for Social Networks and Organization Sciences: from user information to social knowledge
NECO 2018   7thInternational Conference of Networks and Communications
Secu_AgeBigData 2019   Combating Security Challenges in the Age of Big Data
ICFIT--EI, Scopus 2019   2019 8th International Conference on Frontiers of Information Technology (ICFIT 2019)--EI Compendex, Scopus