posted by user: icitst2009 || 7548 views || tracked by 34 users: [display]

ICITST 2010 : The IEEE 5th International Conference for Internet Technology and Secured Transactions 2010


Conference Series : International Conference for Internet Technology and Secured Transactions
When Nov 8, 2010 - Nov 11, 2010
Where London, United Kingdom
Abstract Registration Due Jan 31, 2010
Submission Deadline May 31, 2010
Notification Due Jun 30, 2010
Final Version Due Jul 31, 2010
Categories    internet technology   security   biometrics   web services

Call For Papers


The 5th International Conference for Internet Technology and
Secured Transactions (ICITST-2010), Technical Co-Sponsored
by IEEE UK/RI Communications Chapter, November 8–11, 2010, London, UK

The ICITST is an international refereed conference dedicated
to the advancement of the theory and practical implementation of secured
Internet transactions and to fostering discussions on information
technology evolution. The ICITST aims to provide a highly professional
and comparative academic research forum that promotes collaborative
excellence between academia and industry. The objectives of the
ICITST are to bridge the knowledge gap between academia and industry,
promote research esteem in secured Internet transactions and the
importance of information technology evolution to secured transactions.
The ICITST-2010 invites research papers that encompass conceptual
analysis, design implementation and performance evaluation.
All the accepted papers will appear in the proceedings published
by IEEE and fully indexed by IEEE Xplore. All the ICITST papers
are indexed by DBLP.

The topics in ICITST-2010 include but are not confined to the
following areas:

* Application of agents
* Application security
* Blended Internet security methods
* Biometrics
* Boundary issues of Internet security
* Broadband access technologies
* Challenges of content authoring
* Data mining security
* E-society
* Globalisation of information society
* Government, and corporate Internet security policy
* Internet architecture
* Infonomics
* IPSec quality of services
* Patentability
* Regulation, self-regulation, and co-regulation Web services
* Secured database systems
* Synchronising e-security
* Software Architectures
* Technology-enabled information
* Trust, privacy, and data security
* Wireless transactions
* Context-Awareness and its Data mining for Ubi-com service
* Human-Computer Interface and Interaction for Ubi-com
* Smart Homes and its business model for Ubi-com service
* Intelligent Multimedia Service and its Data management for Ubi-com
* USN / RF-ID for Ubi-com service
* Network security issues, protocols, data security in Ubi-com
* Database protection for Ubi-com
* Privacy Protection and Forensic in Ubi-com
* Multimedia Security in Ubi-com
* Quality of Service Issues
* Authentication and Access control for data protection in Ubi-com
* Information visualization
* Web services
* Service, Security and its Data management for U-commerce
* New novel mechanism and Applications for Ubi-com
* Information Management
* Multimedia Information Systems
* Information Retrieval
* Natural Language Processing
* Digital Libraries
* Data and Information Quality Management
* Data Grids, Data and Information Quality
* Database Management
* Web Databases
* Temporal and Spatial Databases
* Data Mining
* Web Mining including Web Intelligence and Web 3.0
* E-Learning, eCommerce, e-Business and e-Government
* Web Metrics and its applications
* XML and other extensible languages
* Semantic Web and Ontology
* Human-Computer Interaction
* Artificial Intelligence and Expert Systems
* Knowledge Management
* Ubiquitous Systems
* Peer to Peer Data Management
* Interoperability
* Mobile Data Management
* Data Models for Production Systems and Services
* Data Exchange issues and Supply Chain
* Data Life Cycle in Products and Processes
* Case Studies on Data Management, Monitoring and Analysis
* Security and Access Control
* Embedded Systems
* Defence Systems
* Information Content Security
* Software Architecture
* System design and verification
* Mobile, Ad Hoc and Sensor Network Security
* Distributed information systems


Full Paper Submission Date May 31, 2010
Extended Abstract (Work in Progress) Submission Date April 01, 2010
Proposal for Workshops and Tutorials April 30, 2010
Notification of Workshop and Tutorial Acceptance March 15, 2010
Proposal for Industrial Presentation April 30, 2010
Notification of Extended Abstract Acceptance/Rejection May 15, 2010
Notification of Industrial Presentation Acceptance May 15, 2010
Notification of Paper Acceptance/Rejection June 30, 2010
Camera Ready Extended Abstract Due July 31, 2010
Camera Ready Paper Due July 31, 2010
Early Registration Deadline January 01 to July 31, 2010
Late Registration Deadline July 31 to November 08, 2010
Conference Dates November 08-11, 2010

The ICITST also encourages organisations to submit their Job Fair
Booth Reservations and/or Exhibit Proposals. If your organisation
is interested, kindly submit a brief Proposal (not more than 1 side
of A4 page) to

For more details, please visit

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IEEE--ICAIBD--Ei and Scopus 2019   IEEE--2019 The 2nd International Conference on Artificial Intelligence and Big Data (ICAIBD 2019)--Ei Compendex, Scopus
Special Issue IEEE-TLT 2018   CfP Special Issue IEEE-TLT: Data Capture and Analysis to Support Learning Engagement
SECITC 2018   11th International Conference on Security for Information Technology and Communications
ICCSN--IEEE, Ei and Scopus 2019   IEEE--2019 11th International Conference on Communication Software and Networks (ICCSN 2019)--Ei Compendex, Scopus
NECO 2018   7th International Conference of Networks and Communications
ICSIP--IEEE, Ei Compendex and Scopus 2019   2019 IEEE 4th International Conference on Signal and Image Processing (ICSIP 2019)--Ei Compendex and Scopus
IJAB 2018   International Journal of Advances in Biology
SSCI 2019   The 2019 IEEE Symposium Series on Computational Intelligence
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy