posted by user: npatwari || 6485 views || tracked by 19 users: [display]

WIFS 2010 : IEEE International Workshop on Information Forensics and Security


When Dec 12, 2010 - Dec 15, 2010
Where Seattle
Submission Deadline Jun 15, 2010
Categories    signal processing   forensics   security

Call For Papers

IEEE Workshop on Information Forensics and Security - WIFS'10
Seattle, December 12-15, 2010

Seattle, December 12-15, 2010

Call for Submissions

The IEEE International Workshop on Information Forensics and Security (WIFS) is the primary annual event organized by the IEEE’s Information Forensics and Security Technical Committee (IEEE IFS TC). WIFS is a venue for knowledge exchange that encompasses a broad range of disciplines and facilitates the exchange of ideas between various disparate communities that constitute information security. With this focus, we hope that researchers will identify new opportunities for collaboration across disciplines and gain new perspectives.

The conference will feature prominent keynote speakers, tutorials, and lecture sessions. Appropriate topics of interest include, but are not limited to:

. Computer security

o intrusion detection

o vulnerability analysis

o cloud security

. Biometrics

o emerging modalities

o fuzzy extractors

o attacks and countermeasures

. Cryptography for multimedia content

o multimedia encryption

o signal processing in the
encrypted domain

o traitor tracing codes

. Data hiding

o watermarking

o steganography and steganalysis

. Digital Rights Management (DRM)

o DRM primitives (secure clocks,
proximity detection, etc.)

o DRM architectures

o DRM interoperability

. Hardware Security

o Trojans

o Identification, PUFS

o Anti-counterfeiting

. Forensic analysis

o device identification

o data recovery

o validation of forensic evidence

. Network security

o monitoring, detection, response

o network tomography,

surveillance and traceback

. Usable Security, and usability aspects
of security
. Information Theoretical Security

. Privacy

o legal, ethical, social, and

economical issues

o anonymity

. (Video) surveillance:

o arrays of sensors design and

analysis, content tracking.

o events recognition, large crowd
behavior analysis

. Secure Applications

o e-Voting

o e-Commerce

o IPTV, VoIP, Medical


· Tutorials (contact the tutorial chair by): May 15, 2010
· Papers (full paper, 4-6 pages): June 15, 2010
· Notification of acceptance by: August 15, 2010
· Camera-ready paper submission by: September 15, 2010

More information is available at

Related Resources

WIFS 2018   IEEE International Workshop on Information Forensics and Security 2018
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ICASSP 2019   International Conference on Acoustics, Speech, and Signal Processing
IEEE S&P 2019   IEEE Symposium on Security and Privacy
IJAB 2018   International Journal of Advances in Biology
IEEE--ICAIBD--Ei and Scopus 2019   IEEE--2019 The 2nd International Conference on Artificial Intelligence and Big Data (ICAIBD 2019)--Ei Compendex, Scopus
SECITC 2018   11th International Conference on Security for Information Technology and Communications
ECCWS 2019   18th European Conference on Cyber Warfare and Security
ICCC--IEEE, Ei Compendex and Scopus 2018   2018 4th IEEE International Conference on Computer and Communications (ICCC 2018)--Ei Compendex and Scopus