ISBAST 2013 - The 2013 International Symposium on Biometrics and Security Technologies
Topics/Call fo Papers
International Symposium on Biometrics and Security Technologies (ISBAST’13) Website
Chengdu, Sichuan China, July 2-5, 2013
Important Dates
Full paper submission: Feburary 10, 2013
Notification acceptance : March 15, 2013
Camera-ready paper and registration: March 31, 2013
Introduction Currently the applications of computer science are filled with our daily life. So the computer system security has become very important. Therefore, the purpose of this conference is to provide a meeting forum for outstanding researchers to discuss with computing technology, biometric technology, and information security research. The conference not only covers the biometric identification, biometric authentication and information security related technologies, but also includes grid computing and cloud computing and other related issues. Meanwhile, we devoutly wish participants to learn the basic theory of a gradual approach, practical experimental data, new business models, and the latest academic trends from this conference.
Following the traditions of previous successful ISBAST conferences, the objective of ISBAST-13 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of biometric security technology and basic theoretical approach. ISBAST-13 is sponsored by IEEE Computer Society (Taipei Section). ISBAST 2013 will be held in Chengdu, with a focus on two broad areas of Computing and Security Technologies. Chengdu is a beautiful city and there are many places for sightseeing, such as Giant Panda Breeding Research Base, Giant Buddha, Jiuzhaigou National Park, etc. The conference of ISBAST 2013 will be organized by the Southwest Jiaotong University and National Taiwan University of Science and Technology.
We are inviting new and unpublished papers on, but not limited to, the following topics:
Cloud computing
cloud standards, cloud reliability, secure cloud
computing, cloud management, cloud databases,
private vs. public clouds, cloud internetworking,
virtual private inter-cloud, cloud applications
Fault Tolerant Computing
survivability quantification, security quantification,
self-healing, self-protecting and fault-tolerant,
software aging and rejuvenation, safety-critical
systems and software, architecture and system design
for dependability, fault tolerant algorithms and
protocols, tools for design and evaluation of
dependable systems
Biometrics Technologies
face, gait, vein, fingerprint, palmprint, speech,
voice, iris, signature, multimodal biometric fusion
Biometrics Performance Evaluation
confidence interval estimation, performance
modeling and prediction, protocols and benchmarks,
standards
Information Security in Internet
digital rights management, copyright protection
scheme, access control, database security,
cryptographic protocols, distributed systems
security, intrusion detection and avoidance,
secure electronics commence, data & system
integrity, privacy and anonymity, authentication,
security and protection of IT infrastructure,
wireless network security, multimedia security,
digital forensics, watermarking, cryptography,
virus detection and prevention, image copyright
protection
Biometrics Applications
travel and transportation, homeland security,
banking and finance, maritime/airport security,
automobile security, RFID and smart cards,
boarder control, healthcare, access control,
law enforcement, cybersecurity, encryption and
watermarking
Others
.
Submission Informations:
The conference and workshop proceedings will be published by IEEE CS Press to be indexed by EI. Papers not being exceeded 20 single-column double-spaced pages including figures and tables using 11-point type with free layout style should be submitted via (http://isbast13.csie.ntust.edu.tw/). The title page should include at most 150-word abstract, five keywords, affiliations, authors’ names (corresponding author should be specified) and mailing addresses and include a line specifying the submission topic. The paper submitted should not have been published or accepted for publication either in journals or conferences. All submitted papers will be reviewed on the basis of relevance, originality, significance, soundness and clarity. Each paper will be reviewed by at least 3 prominent researchers who are conversant in Cloud Computing and Information Security.
Submission of a paper should be regarded as a commitment that, if the paper is accepted, at least one of the authors will register and attend the conference. Otherwise papers will be possibly removed from IEEE CS digital library. A selection of the best papers will be published in special issues of Security & Communication Networks, International Journal of Adhoc and Ubiquitous Computing, Journal of Cognition, Technology & Work, and Journal of Internet Technology (SCI/SCIE/EI) indexed journals.
Chengdu, Sichuan China, July 2-5, 2013
Important Dates
Full paper submission: Feburary 10, 2013
Notification acceptance : March 15, 2013
Camera-ready paper and registration: March 31, 2013
Introduction Currently the applications of computer science are filled with our daily life. So the computer system security has become very important. Therefore, the purpose of this conference is to provide a meeting forum for outstanding researchers to discuss with computing technology, biometric technology, and information security research. The conference not only covers the biometric identification, biometric authentication and information security related technologies, but also includes grid computing and cloud computing and other related issues. Meanwhile, we devoutly wish participants to learn the basic theory of a gradual approach, practical experimental data, new business models, and the latest academic trends from this conference.
Following the traditions of previous successful ISBAST conferences, the objective of ISBAST-13 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of biometric security technology and basic theoretical approach. ISBAST-13 is sponsored by IEEE Computer Society (Taipei Section). ISBAST 2013 will be held in Chengdu, with a focus on two broad areas of Computing and Security Technologies. Chengdu is a beautiful city and there are many places for sightseeing, such as Giant Panda Breeding Research Base, Giant Buddha, Jiuzhaigou National Park, etc. The conference of ISBAST 2013 will be organized by the Southwest Jiaotong University and National Taiwan University of Science and Technology.
We are inviting new and unpublished papers on, but not limited to, the following topics:
Cloud computing
cloud standards, cloud reliability, secure cloud
computing, cloud management, cloud databases,
private vs. public clouds, cloud internetworking,
virtual private inter-cloud, cloud applications
Fault Tolerant Computing
survivability quantification, security quantification,
self-healing, self-protecting and fault-tolerant,
software aging and rejuvenation, safety-critical
systems and software, architecture and system design
for dependability, fault tolerant algorithms and
protocols, tools for design and evaluation of
dependable systems
Biometrics Technologies
face, gait, vein, fingerprint, palmprint, speech,
voice, iris, signature, multimodal biometric fusion
Biometrics Performance Evaluation
confidence interval estimation, performance
modeling and prediction, protocols and benchmarks,
standards
Information Security in Internet
digital rights management, copyright protection
scheme, access control, database security,
cryptographic protocols, distributed systems
security, intrusion detection and avoidance,
secure electronics commence, data & system
integrity, privacy and anonymity, authentication,
security and protection of IT infrastructure,
wireless network security, multimedia security,
digital forensics, watermarking, cryptography,
virus detection and prevention, image copyright
protection
Biometrics Applications
travel and transportation, homeland security,
banking and finance, maritime/airport security,
automobile security, RFID and smart cards,
boarder control, healthcare, access control,
law enforcement, cybersecurity, encryption and
watermarking
Others
.
Submission Informations:
The conference and workshop proceedings will be published by IEEE CS Press to be indexed by EI. Papers not being exceeded 20 single-column double-spaced pages including figures and tables using 11-point type with free layout style should be submitted via (http://isbast13.csie.ntust.edu.tw/). The title page should include at most 150-word abstract, five keywords, affiliations, authors’ names (corresponding author should be specified) and mailing addresses and include a line specifying the submission topic. The paper submitted should not have been published or accepted for publication either in journals or conferences. All submitted papers will be reviewed on the basis of relevance, originality, significance, soundness and clarity. Each paper will be reviewed by at least 3 prominent researchers who are conversant in Cloud Computing and Information Security.
Submission of a paper should be regarded as a commitment that, if the paper is accepted, at least one of the authors will register and attend the conference. Otherwise papers will be possibly removed from IEEE CS digital library. A selection of the best papers will be published in special issues of Security & Communication Networks, International Journal of Adhoc and Ubiquitous Computing, Journal of Cognition, Technology & Work, and Journal of Internet Technology (SCI/SCIE/EI) indexed journals.
Other CFPs
- National Conference on Trends & Advancement in Computer Science & Engineering (NCTACSE-2013)
- 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013)
- The 13th Privacy Enhancing Technologies Symposium
- International Workshop on Airborne Networks and Communications
- The first International Workshop on Mobile Cloud Computing and Networking
Last modified: 2013-01-03 20:17:57