UISTA 2012 - The 2012 International Workshop on Ubiquitous Information Security Techniques and Applications (UISTA 2012)
Topics/Call fo Papers
UISTA 2012 covers novel methologies, designs, models, and applications on ubiquitous information security techniques. Papers related to the following (but not limited to) topics are encouraged to submit for presentation:
Visual Cryptography
Secret Sharing
Access Control
Privacy Protection
Steganographic/Data Hiding Techniques
Fragile Watermarking/Image Authentication
Copyright Protection
Secret Communication Technique/Protocol
Secure Databases Design
Wireless Security Issues/Techniques
Mobile Information Security Issues/Techniques
Apps Related to Ubiquitous Information Seucirty
Visual Cryptography
Secret Sharing
Access Control
Privacy Protection
Steganographic/Data Hiding Techniques
Fragile Watermarking/Image Authentication
Copyright Protection
Secret Communication Technique/Protocol
Secure Databases Design
Wireless Security Issues/Techniques
Mobile Information Security Issues/Techniques
Apps Related to Ubiquitous Information Seucirty
Other CFPs
Last modified: 2012-03-07 18:39:46