WIFS 2012 - 2012 IEEE International Workshop on Information Forensics and Security (WIFS)
Topics/Call fo Papers
The conference will feature prominent keynote speakers, tutorials, and lecture sessions. Appropriate topics of interest include, but are not limited to:
Computer security
intrusion detection
vulnerability analysis
cloud security
Biometrics
emerging modalities
fuzzy extractors
attacks and countermeasures
Cryptography for multimedia content
multimedia encryption
signal processing in the encrypted domain
traitor tracing codes
Data hiding
watermarking
steganography and steganalysis
Digital Rights Management (DRM)
DRM primitives (secure clocks, proximity detection, etc.)
DRM architectures
DRM interoperability
Hardware Security
Trojans
Identification, PUFS
Anti-counterfeiting
Forensics analysis
device identification
data recovery
validation of forensics evidence
Network Security
monitoring, detection, response
network tomography, surveillance and traceback
Usable security and usability aspects of security
Information Theoretical Security
Privacy
legal, ethical, social, and economical issues
anonymity
(Video) surveillance
arrays of sensors design and analysis, content tracking
events recognition, large crowd behavior analysis
Secure Applications
e-Voting
e-Commerce
IPTV, VoIP, Medical
Computer security
intrusion detection
vulnerability analysis
cloud security
Biometrics
emerging modalities
fuzzy extractors
attacks and countermeasures
Cryptography for multimedia content
multimedia encryption
signal processing in the encrypted domain
traitor tracing codes
Data hiding
watermarking
steganography and steganalysis
Digital Rights Management (DRM)
DRM primitives (secure clocks, proximity detection, etc.)
DRM architectures
DRM interoperability
Hardware Security
Trojans
Identification, PUFS
Anti-counterfeiting
Forensics analysis
device identification
data recovery
validation of forensics evidence
Network Security
monitoring, detection, response
network tomography, surveillance and traceback
Usable security and usability aspects of security
Information Theoretical Security
Privacy
legal, ethical, social, and economical issues
anonymity
(Video) surveillance
arrays of sensors design and analysis, content tracking
events recognition, large crowd behavior analysis
Secure Applications
e-Voting
e-Commerce
IPTV, VoIP, Medical
Other CFPs
- 2012 : International Conference On Statistics In Science, Business And Engineering 2012
- 2015 IEEE International Symposium on Antennas and Propagation and USNC-URSI National Radio Science Meeting
- 2013 IEEE INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION & USNC/URSI NATIONAL RADIO SCIENCE MEETING
- 2014 Ieee International Symposium On Antennas And Propagation And Usnc/Ursi National Radio Science Meeting (Ap-S)
- 2014 Ieee Nuclear & Space Radiation Effects Conference
Last modified: 2011-11-06 18:02:59