| |||||||||||||||||
ICITST 2012 : The 7th International Conference for Internet Technology and Secured TransactionsConference Series : International Conference for Internet Technology and Secured Transactions | |||||||||||||||||
Link: http://www.icitst.org | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
************************************************************
The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), Technical Co-Sponsored by IEEE UK/RI Computer Chapter December 10-12, 2012, London, UK (www.icitst.org) ************************************************************ The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) is Technical Co-sponsored by IEEE UK/RI Computer Chapter. The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry. The topics in ICITST-2012 include but are not confined to the following areas: Internet Application and Technology: * Internet Architecture * Internet of things * Broadband Access Technologies * Application Agents * Boundary Issues of Internet Security * Database Management * Data Models for Production Systems and Services * Artificial Intelligence and Expert Systems * IPSec Quality of Service * Knowledge Management * Embedded Systems * Defence Systems Ubi/Cloud Computing: * Authentication and Access Control for Data Protection in Ubi/Cloud Computing * Context-Awareness and its Data Mining for UbiCom * Data Grids * Distributed Information Systems * Human-Computer Interface and Interaction for UbiCom * Ubiquitous Systems * USN/RFID Service * Smart Homes and its Business Model for UbiCom Service * Security and its Data Management for UbiCom * Peer to Peer Data Management * New Novel Mechanism and Application for Ubi/Cloud Computing Information Security: * Trust, Privacy and Data Security * Network Security Issues and Protocols * Security Challenges and Content Authoring * Cryptography * Secure Communications * Authentication Techniques * Chaos-based Data Security * MANET Security * Wireless Sensor Network Security * Organization Considerations in Security Policy Formulation and Implementations * Digital Forensics and Crimes * Biometrics * Cyber Security Multimedia and Web Services: * Intelligent Multimedia and its Data Management * Multimedia Information Systems * Multimedia Security * Web Databases * Web Metrics and its Applications * Web Mining including Web Intelligence and Web 3.0. * Web Services * XML and other extensible languages * Semantic Web and Ontology Infonomics and e-Technology: * Infonomics * Information Visualization * Information Management * Information Quality * Technology-Enabled Information * e-Learning * e-Commerce * e-Business * e-Government * e-Society * System Design and Security for e-Services * Synchronizing e-Security IMPORTANT DATES Full Paper Submission Date: October 01, 2012 Extended Abstract (Work in Progress) Submission Date: September 15, 2012 Proposal for Workshops and Tutorials: September 15, 2012 Notification of Workshop and Tutorial Acceptance: October 01, 2012 Proposal for Industrial Presentation: September 01, 2012 Notification of Extended Abstract Acceptance/Rejection: September 25, 1012 Notification of Industrial Presentation Acceptance: September 15, 2012 Notification of Paper Acceptance/Rejection: October 20, 2012 Camera Ready Extended Abstract Due: October 10, 2012 Camera Ready Paper Due: November 10, 2012 Early Registration Deadline (Authors only): October 30, 2012 Late Registration Deadline (Authors only): November 10, 2012 Participants Registration: May 01 to December 09, 2012 Conference Dates: December 10-12, 2012 For more details, please contact info@icitst.org |
|