IS 2012 - 2012 Workshop of Information Security
Topics/Call fo Papers
2012 Workshop of Information Security
(Conjunction with STA 2012)
August 23-25, 2012
Yantai, China
http://is2012.nfu.edu.tw
2012 Workshop of Information Security intends to provide a forum for disseminating the latest research results in information, network and systems security. This workshop will bring together industry and academic researchers interested in the technical aspects of cryptology and the latest advances in the information, network and systems security. Your presentation at the workshop would be an excellent opportunity for you to meet colleagues and to discuss technology advancements. The workshop covers a broad range of topics in computer security, including, but not limited to, the following areas:
Access Control
Accounting and Audit
Attacks and Prevention of Online Fraud
Authentication and Authorization
Biometric Security
Block/Stream Cipher
Cloud Computing Security
Communication and Network Security
Computer Crime and Information Warfare
Computer Forensics
Copyright Protection
Cryptanalysis
Cryptography: Digital Signatures, Cryptosystem
Cryptographic Applications: e.g., payments, fair exchange, time-stamping, auctions, voting, polling, location services.
Database and System Security
Digital Rights Management
Formal Methods in Security
Hardware Security
Hash Functions
Implementation, Deployment and Management of Network Security Policies
Information Hiding and Watermarking
Infrastructure Security
Intrusion Avoidance, Detection, and Response
IP Security
Key Management, Cryptographic Protocols and Functions
Multicast Security
Malicious Codes
Network Perimeter Controls: firewalls, packet filters, application gateways.
Operating System Security
Peer-to-Peer Network Security
Privacy and Anonymity
Public Key Cryptosystems: Elliptic Curve Cryptosystems
RFID Security
Secure Computing
Security and Privacy in Pervasive/Ubiquitous Computing
Security Education and Training
Security for Mobile Code
Security in Information Flow
Security Modeling, Architectures and Protocol Design in the Context of Rational and Malicious Adversaries
Security of eCommerce, eBusiness and eGovernment
Security of Grid Computing
Secure E-Mail, Secure Protocols (SSH, SSL, ...)
Security of Limited Devices: e.g., adversarial modeling, light-weight cryptography, efficient protocols and implementations.
Security Evaluations and Measurements
Smart/Java Card Security
Software Security
Spyware
System Security
Trusted Computing
Web Security
Wireless, Mobile, Ad Hoc and Sensor Network Security
Zero Knowledge
Paper Submission
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission of contributions to 2012 Workshop of Information Security occurs through the STA 2012 Workshop paper submission website. Paper must be prepared with PDF. Submissions must not exceed 6 pages, including tables and figures, with only PDF. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. Details can be accessed through
Formatting Instructions:
8.5" x 11" x 2 (DOC, PDF)
Important Dates
Paper Submission Deadline: Mar. 15, 2012--->Mar. 29, 2012(extended)
Acceptance Notification: April 15, 2012--->April 29, 2012(extended)
Final Camera-Ready Due: April 30, 2012--->May 15, 2012(extended)
Late/On-site Registration Due: May 23, 2012
Workshop Dates: Aug. 23-25, 2012
Contact
If you have any question about the CFP and paper submission, please email to Prof. Wen-Chung Kuo (simonkuo-AT-yuntech.edu.tw).
(Conjunction with STA 2012)
August 23-25, 2012
Yantai, China
http://is2012.nfu.edu.tw
2012 Workshop of Information Security intends to provide a forum for disseminating the latest research results in information, network and systems security. This workshop will bring together industry and academic researchers interested in the technical aspects of cryptology and the latest advances in the information, network and systems security. Your presentation at the workshop would be an excellent opportunity for you to meet colleagues and to discuss technology advancements. The workshop covers a broad range of topics in computer security, including, but not limited to, the following areas:
Access Control
Accounting and Audit
Attacks and Prevention of Online Fraud
Authentication and Authorization
Biometric Security
Block/Stream Cipher
Cloud Computing Security
Communication and Network Security
Computer Crime and Information Warfare
Computer Forensics
Copyright Protection
Cryptanalysis
Cryptography: Digital Signatures, Cryptosystem
Cryptographic Applications: e.g., payments, fair exchange, time-stamping, auctions, voting, polling, location services.
Database and System Security
Digital Rights Management
Formal Methods in Security
Hardware Security
Hash Functions
Implementation, Deployment and Management of Network Security Policies
Information Hiding and Watermarking
Infrastructure Security
Intrusion Avoidance, Detection, and Response
IP Security
Key Management, Cryptographic Protocols and Functions
Multicast Security
Malicious Codes
Network Perimeter Controls: firewalls, packet filters, application gateways.
Operating System Security
Peer-to-Peer Network Security
Privacy and Anonymity
Public Key Cryptosystems: Elliptic Curve Cryptosystems
RFID Security
Secure Computing
Security and Privacy in Pervasive/Ubiquitous Computing
Security Education and Training
Security for Mobile Code
Security in Information Flow
Security Modeling, Architectures and Protocol Design in the Context of Rational and Malicious Adversaries
Security of eCommerce, eBusiness and eGovernment
Security of Grid Computing
Secure E-Mail, Secure Protocols (SSH, SSL, ...)
Security of Limited Devices: e.g., adversarial modeling, light-weight cryptography, efficient protocols and implementations.
Security Evaluations and Measurements
Smart/Java Card Security
Software Security
Spyware
System Security
Trusted Computing
Web Security
Wireless, Mobile, Ad Hoc and Sensor Network Security
Zero Knowledge
Paper Submission
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission of contributions to 2012 Workshop of Information Security occurs through the STA 2012 Workshop paper submission website. Paper must be prepared with PDF. Submissions must not exceed 6 pages, including tables and figures, with only PDF. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. Details can be accessed through
Formatting Instructions:
8.5" x 11" x 2 (DOC, PDF)
Important Dates
Paper Submission Deadline: Mar. 15, 2012--->Mar. 29, 2012(extended)
Acceptance Notification: April 15, 2012--->April 29, 2012(extended)
Final Camera-Ready Due: April 30, 2012--->May 15, 2012(extended)
Late/On-site Registration Due: May 23, 2012
Workshop Dates: Aug. 23-25, 2012
Contact
If you have any question about the CFP and paper submission, please email to Prof. Wen-Chung Kuo (simonkuo-AT-yuntech.edu.tw).
Other CFPs
- Raw Materials Risk Management in GMP Facilities: Avoiding GMP non-Compliance Due to Raw Material Issues
- Making All Data Count: FDA Acceptance of non-US Clinical Trials
- Software validation and 21 CFR Part 11 remediation planning: FDA inspection strategies
- 21CFR Part 11 - Predicate Rules Compliance
- International Information Security Day
Last modified: 2012-03-19 14:44:37