posted by system || 5486 views || tracked by 6 users: [display]

WIAS 2011 : International Workshop on Information Assurance and Security

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/wias2011
 
When Sep 19, 2011 - Sep 21, 2011
Where Niagra Falls, Canada
Submission Deadline Mar 31, 2011
Notification Due May 15, 2011
Final Version Due Jun 20, 2011
Categories    security   assurance
 

Call For Papers

============================================
Call for papers

International Workshop on Information Assurance and Security (WIAS-11)

Niagara Falls, Ontario, Canada

September 2011

https://sites.google.com/site/wias2011/

============================================

SCOPE

-----

Information assurance and security has become an imperative research

issue in the networked and distributed information sharing

environments. The progressive dependence of global economic

infrastructure on information technology result in an increase of

security attacks on networked and distributed information systems. The

most advanced technology and highly trained professionals think it

challenging to find the effective ways to protect information systems,

networks and sensitive data within the critical information

infrastructure. There is a need to discover innovative ideas and

technology for classification of information assets, risk assessment

and risk management plan to provide an information assurance and

security to information systems.

Topics of interest include, but are not limited to:

- Authentication and access contro

- Primitives for cryptographic protocols

- Secure system engineering

- Secure routing and transport protocols

- Secure data aggregation

- Secure information processing

- Key management

- Secure bootstrapping

- Secure group communication

- Trust Management

- Biometrics

- Computer Forensics

- Digital Signatures

- Intrusion Detection System

- Public Key Cryptosystems

- Wireless Sensor Network Security

- Personal Network Security

- Mobile and Ad hoc Network Security

- Data Mining for Security

- Multimedia Security

- E-Business Assurance

- Internet Security

- Reputation Management

- Secure real-world applications

- Security policy and enforcement issues

- Incentive-aware secure protocol design

- Mobile platform and systems security



All submitted papers will be rigorously reviewed and we will select

papers based on their originality, timeliness, significance, relevance

to the workshop. All accepted papers must be presented and at least on

author

needs to register for the paper to be included in the workshop

proceedings. Submitted papers should not be under consideration for

publication anywhere else.


IMPORTANT DATES

----------------

Papers submission deadline: March 31,2011

Acceptance Notification: May 15, 2011?

Camera Ready deadline: June 20, 2011?

Registration deadline: May 30, 2011

Workshop date : September 19-21, 2011


SUBMISSION PROCEDURE

--------------------

The workshop accepts only novel, previously unpublished papers.

Every submitted paper will be carefully reviewed by at least two

members of the International Program Committee. All accepted papers

will be published by Elsevier Science in the open-access Procedia

Computer Science series (on-line and CD).

Authors should submit paper with no more than 6 pages length as an

attachment (in PDF or doc format)? at?

https://www.easychair.org/conferences/?conf=wias2011

The submitted paper must be formatted according to the guidelines of

Procedia Computer Science, MS Word Template, Latex,

Elsevier.

For additional information see
https://sites.google.com/site/wias2011/
or contact
firdous.imam@gmail.com


ORGANIZING COMMITTEE
--------------------

General Co-Chairs

Sherali Zeadally, University of the District of Columbia, USA

Eisa Aleisa, Imam University, Saudi Arabia

Naixue Xiong, Georgia State University, USA


Technical Program Co-Chairs

Sajid Hussain, Fisk University, USA

Firdous Kausar, Imam University, Saudi Arabia

Puteh Saad, Imam University, Saudi Arabia


Technical Program Commitee

* Thinus Booysen, Stellenbosch University, South Africa
* Subariah Ibrahim, Universiti Teknologi, Malaysia
* Srinivas Sampalli, Dalhousie University, Canada
* Senol Erdogan, Maltepe University, Turkey
* Scott Fowler, Link?ping University, Sweden
* Sang-Soo YEO, Mokwon University, S. Korea
* Rabiah Ahmad,Universiti Teknologi, Malaysia
* Rabia Riaz, Ajou University, South Korea
* Nicolas Sklavos, Technological Educational Institute of Patras, Greece
* Naveen Chilamkurti, La Trobe University, Australia
* Nafaa Jabeur, Dhofar University, Oman
* Michael Grimaila, Air Force Institute of Technology, USA
* Musfiq Rahman, Dalhousie University, Canada
* Mubashshsarul Shafique, Carleton University, Canada
* Min Chen, Seoul National University, South Korea
* Mehreen Afzal, NUST, Pakistan
* Md Shafayat Rahman, Acadia University, Canada
* Mazleena Salleh,Universiti Teknologi, Malaysia
* Maryam al Oshan, Imam University, Saudi Arabia
* Malcolm Shore, University of Canterbury, New Zealand
* Ki-Hyung Kim, Ajou University, South Korea
* Khalid Suwais, Imam University, Saudi Arabia
* Kashinath Basu, Oxford Brookes University, United Kingdom
* Jesus Tellez, Universidad de Carabobo, Venezuela
* Jacky Hartnett, University of Tasmania, Australia
* Ioannis Anagnostopoulos, University of Central Greece, Greece
* Imran Khan , University of Manitoba, Canada
* Heba Muhammad, Imam University, Saudi Arabia
* Heba Kurdi, Imam University, Saudi Arabia
* Haifa Alqasim, Imam University, Saudi Arabia
* Gregorio Martinez, University of Murcia, Spain
* Faisal Bashir Hussain, NUST, Pakistan
* Deok Gyu Lee, ETRI, South Korea
* Changhoon Lee, Hanshin University, South Korea
* Ashif Yousuf, Acadia University, Canada
* Anwer Mirza, King Saud University, Saudi Arabia
* Ahmed Raza Cheema, NUST, Pakistan
* Abdul Ghafoor, NUST, Pakistan

Related Resources

IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
IJITMC 2024   The International Journal of Information Technology, Modeling and Computing
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
COIT 2025   5th International Conference on Computing and Information Technology