posted by user: aawad || 8319 views || tracked by 5 users: [display]

ICCSPA 2013 : Special Session on: Information Security: Trends, Techniques and Applications

FacebookTwitterLinkedInGoogle

Link: https://www2.aus.edu/conferences/iccspa/documents/Special_Session_1.pdf
 
When Feb 12, 2013 - Feb 14, 2013
Where Sharjah, UAE
Submission Deadline Oct 21, 2012
Notification Due Nov 15, 2012
Final Version Due Dec 15, 2012
Categories    biometrics   information security   image processing   encryption
 

Call For Papers

A Special Session on
Information Security: Trends, Techniques and Applications
In conjunction with the First International Conference on Communications, Signal Processing, and their Applications (ICCSPA'13)
Sharjah, UAE, February 12-14, 2013
https://www2.aus.edu/conferences/iccspa/index.html

Aims and Scope:
Information security has become a crucial need for almost all information transaction applications due to the large diversity of the hackers and attacks. Traditional techniques such as cryptography, watermarking, and data hiding are basic notions and play an important role in developing information security algorithms and solutions. Biometrics technologies are a new trend in information security that provide good security level. Biometrics can be easily combined with the traditional techniques in order to achieve much stronger security levels. In spite of the large development in the information security techniques, there are still several challenges that need to be addressed in terms of time, accuracy and reliability. This special session focus
on the information security research area with respect to trends, advanced techniques and the applications. The aim of this special session is to attract researchers and practitioners from academia and industry, and provide a discussion environment in order to share their experiences in information security. Topics of interest include but are not limited to:
-Information security trends:
ˆ --Information security for networks authentication
ˆ --Information security within embedded systems
ˆ --Biometrics technologies and their applications
-Information security techniques:
ˆ --Data encryption and cryptography techniques
--Digital image watermarking and data hiding
ˆ --Image processing theories and applications
-Information security applications:
ˆ --Privacy protection and the ethics issues
ˆ --Access control and database security
ˆ --Digital right management

Paper Submission:
The session solicits original, unpublished, and high-quality research papers. The authors are invited to submit their contributions formatted as IEEE double columns. All submitted papers will be refereed by at least two reviewers for quality, correctness, originality, and relevance. All accepted papers will be published in the conference proceeding and will be included in IEEE Xplore digital library. The authors are kindly asked to follow the (ICCSPA'13) submission procedure and select the Special Session from the conference submission system, and with email notification to the session organizer (aawad@ieee.org) including the paper ID and the paper title.

Important Dates:
ˆ--Deadline for paper submission: October 21, 2012
ˆ--Notification of acceptance/rejection: November 15, 2012
ˆ--Deadline for camera-ready submission: December 15, 2012
ˆ--Conference date: February 12-14, 2013

Session Organizers:
Dr.: Ali Ismail Awad
Al Azhar University, Egypt
Member of Scientific c Research Group in Egypt (SRGE), aawad@ieee.org

Professor: Aboul Ella Hassanien
Cairo University, Egypt
Chairman of Scientific Research Group in Egypt (SRGE), aboitcairo@gmail.com

Related Resources

CSEIJ 2022   Computer Science & Engineering: An International Journal
IJCIS 2022   International Journal on Cryptography and Information Security
HRPQ 2022   Handbook of Research on Trends and Applied Techniques for Power Quality in Smart Grids
IVSP--ACM, EI, Scopus 2022   ACM--2022 4th International Conference on Image, Video and Signal Processing (IVSP 2022)--Ei Compendex, Scopus
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
ECNLPIR 2022   2022 European Conference on Natural Language Processing and Information Retrieval (ECNLPIR 2022)
ACM--IPMV--Ei Compendex & Scopus 2022   ACM--2022 4th International Conference on Image Processing and Machine Vision (IPMV 2022)--Ei Compendex, Scopus
AVC 2022   Advances in Vision Computing: An International Journal
GoodIT 2022   ACM International Conference on Information Technology for Social Good
SECRYPT 2022   19th International Conference on Security and Cryptography