| |||||||||||||||
IWSEC 2011 : International Workshop on SecurityConference Series : International Workshop on Security | |||||||||||||||
Link: http://www.iwsec.org/2011/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * ---
IWSEC 2011 Preliminary Call for Papers The 6th International Workshop on Security (IWSEC 2011) November 8-10, 2011 IIS Convention Hall, The University of Tokyo, Japan IWSEC Web Page: http://www.iwsec.org/ Planned to be jointly organized by ISEC of IEICE and CSEC of IPSJ [Important Dates (tentative)] * Submission deadline: April 26, 2011 (23:59 UTC) * Notification of decision: July 1, 2011 * Final version due: July 25, 2011 * Workshop: November 8-10, 2011 [Overview] Original papers on the research and development of various security topics are solicited for submission to IWSEC 2011. Topics of interest for IWSEC 2011 include but are not limited to: I: Foundations of Security Authentication Biometrics Block/Stream Ciphers Cryptographic Protocols Cryptanalysis Digital Signatures Hash Functions Information Hiding Public Key Cryptosystems Quantum Security II: Security in Networks and Ubiquitous Computing Systems Network Security Intrusion Detection Malware Detection Security in Sensor Networks Security of Ubiquitous and Cloud Computing Security of Multi-party Computing Authorization and Access Control Mobile Security Privacy Enhancing Technology Anonymity-related Technology Privacy Preserving System Privacy on WEB and DB Software Security Security Architectures Data and System Integrity Reliable Secure Interactions of Services III: Security in Real Life Applications Secure Living and Working Environments Secure Consumer Electronics RFID Security Security in Commerce and Government DRM Copyright Protection Content Security E-business/e-commerce/e-government Security Security Management Access Control Policies and ISMS Business Processes Security Protection of Critical Infrastructures Critical Infrastructure Protection Risk Analysis and Risk Management Testing, Verification and Certification Security Verification Assurance Law, Policy, Ethics and Related Technologies Digital Forensics Information Law and Ethics [Instructions for Authors] Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total (including bibliography and appendices), in the standard LNCS format (except for author names and affiliations). Submissions to IWSEC 2011 should be submitted electronically in PDF format. A detailed description of the electronic submission procedure will available at the workshop website. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. At least one author of each accepted paper is required to register with the workshop and present the paper. [Proceedings] Proceedings are intended to be published in Springer-Verlag's Lecture Notes in Computer Science series. [Best Paper Awards] Prizes will be awarded to the authors of the best paper(s) and the best student paper(s). [Committees] General Chairs: Kanta Matsuura (The University of Tokyo, Japan) Naoya Torii (Fujitsu Laboratories, Japan) Program Chairs: Tetsu Iwata (Nagoya University, Japan) Masakatsu Nishigaki (Shizuoka University, Japan) --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- |
|