posted by user: iseohyun || 13370 views || tracked by 19 users: [display]

WISA 2011 : International Workshop on Information Security Applications (SCIE Journal Publication of Selected Papers)

FacebookTwitterLinkedInGoogle


Conference Series : Workshop on Information Security Applications
 
Link: http://www.wisa.or.kr
 
When Aug 22, 2011 - Aug 24, 2011
Where Jeju Grand Hotel, Jeju Island, Korea
Submission Deadline Jun 20, 2011
Notification Due Jul 18, 2011
Final Version Due Sep 18, 2011
Categories    security   applications   information   cryptography
 

Call For Papers

The 12th International Workshop on Information Security Applications(WISA 2011)

Jeju Grand Hetel, Jeju Island, Korea
www.wisa.or.kr
August 22-24, 2011

The 12th International Workshop on Information Security Applications(WISA 2011) will be held in Jeju Island, Korea on August 22-24, 2011. It is hosted by the Korea Institute of Information Security and Cryptology(KIISC), supported by the Electronics & Telecommunications Research Institute(ETRI) and the Korea Internet & Security Agency(KISA), and sponsored by the Ministry of Public Administration and Security(MoPAS) and the Korea Communications Commission(KCC). The focus of this workshop is on all technical and practical aspects of cryptographic and non-cryptographic security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry.

SCIE Journal Publication of Selected Papers
---------------------
Expanded versions of selected papers will be published in KSII Transactions on Internet and Information Systems (TIIS)(http://www.itiis.org) indexed by SCI-E.


Aim and Scope:
---------------------
The focus of this workshop is on all technical and practical aspects of cryptographic and non- cryptographic security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry.

The areas of interest include, but are not limited to:

* Internet & Wireless Security
* E-Commerce Protocols
* Access Control & Database Security
* Biometrics & Human Interface
* Network Security & Intrusion Detection
* Security & Trust Management
* IPTV Security
* Content Protection & Service Security
* Digital Rights Management
* Secure Software & Systems
* Information Hiding
* Digital Forensics
* Secure Hardware
* Cyber Indication & Intrusion Detection
* Multicast & Group Security
* Secure Application Protocols
* Secure Coding
* Smart Cards & Applications
* Mobile Security
* Privacy & Anonymity
* Public Key Crypto Applications
* Threats & Information Warfare
* Virus Protection & Applications
* Ubiquitous Computing Security
* Combating SPAM
* ID Management
* Peer-to-Peer Security
* Information Assurance
* RFID Security & Applications
* Sensor Network Security & Applications
* Common Criteria
* Critical Information Infrastructure Protection
* Video Surveillance Systems
* Smartphone Security

Submission Guidelines
---------------------
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS"(http://www.springer.de/comp/lncs/authors.html) and limited to at most 15 pages in total.

Important Dates:
---------------------
Paper Submission deadline: June 20, 2011
Acceptance notification: July 18, 2011
Pre-proceedings version deadline: August 8, 2011
Proceedings version deadline: September 18, 2011

Related Resources

ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICITA 2025   19th International Conference on Information Technology and Applications
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
SECRYPT 2025   22nd International Conference on Security and Cryptography
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)