posted by user: zusmani || 3499 views || tracked by 4 users: [display]

ISBAST 2013 : The 2013 International Symposium on Biometrics and Security Technologies


When Jul 2, 2013 - Jul 5, 2013
Where Chengdu, Sichuan China
Submission Deadline Feb 10, 2013
Notification Due Mar 15, 2013
Final Version Due Mar 31, 2013
Categories    biometrics applications   cloud computing   biometrics performance evaluat   biometrics technologies

Call For Papers

2-5 July 2013, CHENGDU, CHINA

Selected papers will be considered for special issues in SCI/SCIE indexed international journals.

International Journal of Adhoc and Ubiquitous Computing (Inderscience), Journal of Internet Technology, Security & Communication Networks (Wiley), International Journal of Distributed Sensor Networks (Hindawi)

Currently, the applications of computer science are filled with our daily life therefore computer system security has become very important. The purpose of this conference is to provide a meeting forum for outstanding researchers to discuss with computing technology, biometric technology, and information security research. The conference not only covers the biometric identification, biometric authentication and information security related technologies, but also includes grid computing and cloud computing and other related issues. Meanwhile, we devoutly wish participants to learn the basic theory of a gradual approach, practical experimental data, new business models, and the latest academic trends from this conference.

Following the traditions of previous successful ISBAST conferences, the objective of ISBAST-13 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of biometric security technology and basic theoretical approach. ISBAST-13 is sponsored by IEEE Computer Society (Taipei Section) and proceedings will be published by the IEEE CS Press. ISBAST 2013 will be held in Chengdu, with a focus on two broad areas of Computing and Security Technologies. Chengdu is a beautiful city and there are many places for sightseeing, such as Giant Panda Breeding Research Base, Giant Buddha, Jiuzhaigou National Park, etc. ISBAST 2013 will be organized by the Southwest Jiaotong University and National Taiwan University of Science and Technology.

We are inviting new and unpublished papers on, but not limited to, the following topics:

* Cloud Computing Security cloud standards, cloud reliability, secure cloud computing, cloud management, cloud databases, private vs. public clouds, cloud internetworking, virtual private inter-cloud, cloud applications

* Fault Tolerant and Dependable Computing survivability quantification, security quantification, self-healing, self-protecting and fault-tolerant, software aging and rejuvenation, safety-critical systems and software, architecture and system design for dependability, fault tolerant algorithms and protocols, tools for design and evaluation of dependable systems

* Biometrics Technologies face, gait, vein, fingerprint, palmprint, speech, voice, iris, signature, multimodal biometric fusion

* Biometrics Performance Evaluation confidence interval estimation, performance modeling and prediction, protocols and benchmarks, standards

Important Dates

Full paper submission Feburary 10, 2013
Notification March 15, 2013
Camera-ready paper and registration March 31, 2013

* Information Security in Internet digital rights management, copyright protection scheme, access control, database security, cryptographic protocols, distributed systems security, intrusion detection and avoidance, secure electronics commence, data & system integrity, privacy and anonymity, authentication, security and protection of IT infrastructure, wireless network security, multimedia security, digital forensics, watermarking, cryptography, virus detection and prevention, image copyright protection
* Biometrics Applications travel and transportation, homeland security, banking and finance, maritime/airport security, automobile security, RFID and smart cards, boarder control, healthcare, access control, law enforcement, cybersecurity, encryption and watermarking
* Others

Related Resources

ICINT--EI, Scopus 2019   2019 4th International Conference on Information and Network Technologies (ICINT 2019)--EI Compendex, Scopus
ACM--ICCDA--Ei Compendex, Scopus 2019   ACM--2019 3rd International Conference on Compute and Data Analysis (ICCDA 2019)--Ei Compendex, Scopus
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
CLOUD 2019   8th International Conference on Cloud Computing: Services and Architecture
IEEE S&P 2019   IEEE Symposium on Security and Privacy
ICCTS--EI Compendex, Scopus 2018   2018 7th International Conference on Computer Technology and Science (ICCTS 2018)--EI Compendex, Scopus
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ICBDE--Ei Compendex and Scopus 2019   2019 2nd International Conference on Big Data and Education (ICBDE 2019)--Ei Compendex and Scopus
ACNS 2019   International Conference on Applied Cryptography and Network Security
ICCSEA 2018   8th International Conference On Computer Science, Engineering And Applications