posted by user: zusmani || 3487 views || tracked by 4 users: [display]

ISBAST 2013 : The 2013 International Symposium on Biometrics and Security Technologies


When Jul 2, 2013 - Jul 5, 2013
Where Chengdu, Sichuan China
Submission Deadline Feb 10, 2013
Notification Due Mar 15, 2013
Final Version Due Mar 31, 2013
Categories    biometrics applications   cloud computing   biometrics performance evaluat   biometrics technologies

Call For Papers

2-5 July 2013, CHENGDU, CHINA

Selected papers will be considered for special issues in SCI/SCIE indexed international journals.

International Journal of Adhoc and Ubiquitous Computing (Inderscience), Journal of Internet Technology, Security & Communication Networks (Wiley), International Journal of Distributed Sensor Networks (Hindawi)

Currently, the applications of computer science are filled with our daily life therefore computer system security has become very important. The purpose of this conference is to provide a meeting forum for outstanding researchers to discuss with computing technology, biometric technology, and information security research. The conference not only covers the biometric identification, biometric authentication and information security related technologies, but also includes grid computing and cloud computing and other related issues. Meanwhile, we devoutly wish participants to learn the basic theory of a gradual approach, practical experimental data, new business models, and the latest academic trends from this conference.

Following the traditions of previous successful ISBAST conferences, the objective of ISBAST-13 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of biometric security technology and basic theoretical approach. ISBAST-13 is sponsored by IEEE Computer Society (Taipei Section) and proceedings will be published by the IEEE CS Press. ISBAST 2013 will be held in Chengdu, with a focus on two broad areas of Computing and Security Technologies. Chengdu is a beautiful city and there are many places for sightseeing, such as Giant Panda Breeding Research Base, Giant Buddha, Jiuzhaigou National Park, etc. ISBAST 2013 will be organized by the Southwest Jiaotong University and National Taiwan University of Science and Technology.

We are inviting new and unpublished papers on, but not limited to, the following topics:

* Cloud Computing Security cloud standards, cloud reliability, secure cloud computing, cloud management, cloud databases, private vs. public clouds, cloud internetworking, virtual private inter-cloud, cloud applications

* Fault Tolerant and Dependable Computing survivability quantification, security quantification, self-healing, self-protecting and fault-tolerant, software aging and rejuvenation, safety-critical systems and software, architecture and system design for dependability, fault tolerant algorithms and protocols, tools for design and evaluation of dependable systems

* Biometrics Technologies face, gait, vein, fingerprint, palmprint, speech, voice, iris, signature, multimodal biometric fusion

* Biometrics Performance Evaluation confidence interval estimation, performance modeling and prediction, protocols and benchmarks, standards

Important Dates

Full paper submission Feburary 10, 2013
Notification March 15, 2013
Camera-ready paper and registration March 31, 2013

* Information Security in Internet digital rights management, copyright protection scheme, access control, database security, cryptographic protocols, distributed systems security, intrusion detection and avoidance, secure electronics commence, data & system integrity, privacy and anonymity, authentication, security and protection of IT infrastructure, wireless network security, multimedia security, digital forensics, watermarking, cryptography, virus detection and prevention, image copyright protection
* Biometrics Applications travel and transportation, homeland security, banking and finance, maritime/airport security, automobile security, RFID and smart cards, boarder control, healthcare, access control, law enforcement, cybersecurity, encryption and watermarking
* Others

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
UCC 2018   11th IEEE/ACM International Conference on Utility and Cloud Computing
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
ICCC--IEEE, Ei Compendex and Scopus 2018   2018 4th IEEE International Conference on Computer and Communications (ICCC 2018)--Ei Compendex and Scopus
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
ACNS 2019   International Conference on Applied Cryptography and Network Security
SC2 2018   The 8th IEEE International Symposium on Cloud and Services Computing
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
AMLTA 2019   The 4th International Conference on Advanced Machine Learning Technologies and Applications.