| |||||||||||||||
ICCSPA 2013 : Special Session on: Information Security: Trends, Techniques and Applications | |||||||||||||||
Link: https://www2.aus.edu/conferences/iccspa/documents/Special_Session_1.pdf | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
A Special Session on
Information Security: Trends, Techniques and Applications In conjunction with the First International Conference on Communications, Signal Processing, and their Applications (ICCSPA'13) Sharjah, UAE, February 12-14, 2013 https://www2.aus.edu/conferences/iccspa/index.html Aims and Scope: Information security has become a crucial need for almost all information transaction applications due to the large diversity of the hackers and attacks. Traditional techniques such as cryptography, watermarking, and data hiding are basic notions and play an important role in developing information security algorithms and solutions. Biometrics technologies are a new trend in information security that provide good security level. Biometrics can be easily combined with the traditional techniques in order to achieve much stronger security levels. In spite of the large development in the information security techniques, there are still several challenges that need to be addressed in terms of time, accuracy and reliability. This special session focus on the information security research area with respect to trends, advanced techniques and the applications. The aim of this special session is to attract researchers and practitioners from academia and industry, and provide a discussion environment in order to share their experiences in information security. Topics of interest include but are not limited to: -Information security trends: --Information security for networks authentication --Information security within embedded systems --Biometrics technologies and their applications -Information security techniques: --Data encryption and cryptography techniques --Digital image watermarking and data hiding --Image processing theories and applications -Information security applications: --Privacy protection and the ethics issues --Access control and database security --Digital right management Paper Submission: The session solicits original, unpublished, and high-quality research papers. The authors are invited to submit their contributions formatted as IEEE double columns. All submitted papers will be refereed by at least two reviewers for quality, correctness, originality, and relevance. All accepted papers will be published in the conference proceeding and will be included in IEEE Xplore digital library. The authors are kindly asked to follow the (ICCSPA'13) submission procedure and select the Special Session from the conference submission system, and with email notification to the session organizer (aawad@ieee.org) including the paper ID and the paper title. Important Dates: --Deadline for paper submission: October 21, 2012 --Notification of acceptance/rejection: November 15, 2012 --Deadline for camera-ready submission: December 15, 2012 --Conference date: February 12-14, 2013 Session Organizers: Dr.: Ali Ismail Awad Al Azhar University, Egypt Member of Scientificc Research Group in Egypt (SRGE), aawad@ieee.org Professor: Aboul Ella Hassanien Cairo University, Egypt Chairman of Scientific Research Group in Egypt (SRGE), aboitcairo@gmail.com |
|