| |||||||||||
WIFS 2010 : IEEE International Workshop on Information Forensics and Security | |||||||||||
Link: http://wifs10.org/CallForPapers.aspx | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
IEEE Workshop on Information Forensics and Security - WIFS'10 Seattle, December 12-15, 2010 Seattle, December 12-15, 2010 Call for Submissions The IEEE International Workshop on Information Forensics and Security (WIFS) is the primary annual event organized by the IEEE’s Information Forensics and Security Technical Committee (IEEE IFS TC). WIFS is a venue for knowledge exchange that encompasses a broad range of disciplines and facilitates the exchange of ideas between various disparate communities that constitute information security. With this focus, we hope that researchers will identify new opportunities for collaboration across disciplines and gain new perspectives. The conference will feature prominent keynote speakers, tutorials, and lecture sessions. Appropriate topics of interest include, but are not limited to: . Computer security o intrusion detection o vulnerability analysis o cloud security . Biometrics o emerging modalities o fuzzy extractors o attacks and countermeasures . Cryptography for multimedia content o multimedia encryption o signal processing in the encrypted domain o traitor tracing codes . Data hiding o watermarking o steganography and steganalysis . Digital Rights Management (DRM) o DRM primitives (secure clocks, proximity detection, etc.) o DRM architectures o DRM interoperability . Hardware Security o Trojans o Identification, PUFS o Anti-counterfeiting . Forensic analysis o device identification o data recovery o validation of forensic evidence . Network security o monitoring, detection, response o network tomography, surveillance and traceback . Usable Security, and usability aspects of security . Information Theoretical Security . Privacy o legal, ethical, social, and economical issues o anonymity . (Video) surveillance: o arrays of sensors design and analysis, content tracking. o events recognition, large crowd behavior analysis . Secure Applications o e-Voting o e-Commerce o IPTV, VoIP, Medical Schedule · Tutorials (contact the tutorial chair by): May 15, 2010 · Papers (full paper, 4-6 pages): June 15, 2010 · Notification of acceptance by: August 15, 2010 · Camera-ready paper submission by: September 15, 2010 More information is available at www.wifs10.org |
|