ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IHTIAP 2013 - The Second Workshop on Information Hiding Techniques for Internet Anonymity and Privacy IHTIAP 2013

Date2013-07-21 - 2013-07-26

Deadline2013-02-27

VenueNice, Italy Italy

Keywords

Websitehttps://www.iaria.org/conferences2013

Topics/Call fo Papers

The evolving usages and economic models on the Internet tend to involve a lot of personal data disclosure. This information sharing is usually intended and assumed by the users, either because it is needed for service personalization or because it is simply the core aspect of a distributed social application. Yet, it often leads to abusive, unexpected, or unwanted behavioral profiling.
Individual online tracking is even possible and has been frequently reported. In most serious cases, impersonation and identity theft can prove disastrous for users. There is thus a salient need for efficient tools providing users with reliable pseudonymity, anonymity, and privacy on the Internet, allowing them to fully benefit from the services and applications without avoiding privacy breaches.
The First Information Hiding Techniques for Internet Anonymity and Privacy, IHTIAP 2012, provides a forum for engineers and scientists in academia, industry, and government to address challenges and to present and discuss their new ideas, research results, applications and experience on aspects of information hiding techniques for Internet anonymity and privacy.
We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.
Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.
Tutorials on specific related topics and panels on challenging areas are encouraged.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All topics and submission formats are open to both research and industry contributions.
Topics of interest include, but are not limited to:
Anonymity and privacy theory (information theory of privacy, statistics and decision theory for anonymity, mathematical models)
Data hiding for anonymity techniques (digital watermarking, steganography, etc.)
Anonymity and privacy attacks and metric (security models, forensics and counter-forensics, acquisition system identification, etc.)
Practical uses of anonymity and privacy
Danger of anonymity in digital society (uncontrolled defamation, uncontrolled replicas, etc.)

Last modified: 2012-11-23 12:36:10