posted by user: zusmani || 4407 views || tracked by 4 users: [display]

ISBAST 2013 : The 2013 International Symposium on Biometrics and Security Technologies

FacebookTwitterLinkedInGoogle

Link: http://isbast13.csie.ntust.edu.tw/CFP%20ISBAST-Final.pdf
 
When Jul 2, 2013 - Jul 5, 2013
Where Chengdu, Sichuan China
Submission Deadline Feb 10, 2013
Notification Due Mar 15, 2013
Final Version Due Mar 31, 2013
Categories    biometrics applications   cloud computing   biometrics performance evaluat   biometrics technologies
 

Call For Papers

ALL FOR PAPERS
IEEE INTERNATIONAL SYMPOSIUM ON BIOMETRICS & SECURITY TECHNOLOGIES (ISBAST'13)
2-5 July 2013, CHENGDU, CHINA
http://isbast13.csie.ntust.edu.tw

Selected papers will be considered for special issues in SCI/SCIE indexed international journals.

International Journal of Adhoc and Ubiquitous Computing (Inderscience), Journal of Internet Technology, Security & Communication Networks (Wiley), International Journal of Distributed Sensor Networks (Hindawi)


Currently, the applications of computer science are filled with our daily life therefore computer system security has become very important. The purpose of this conference is to provide a meeting forum for outstanding researchers to discuss with computing technology, biometric technology, and information security research. The conference not only covers the biometric identification, biometric authentication and information security related technologies, but also includes grid computing and cloud computing and other related issues. Meanwhile, we devoutly wish participants to learn the basic theory of a gradual approach, practical experimental data, new business models, and the latest academic trends from this conference.


Following the traditions of previous successful ISBAST conferences, the objective of ISBAST-13 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of biometric security technology and basic theoretical approach. ISBAST-13 is sponsored by IEEE Computer Society (Taipei Section) and proceedings will be published by the IEEE CS Press. ISBAST 2013 will be held in Chengdu, with a focus on two broad areas of Computing and Security Technologies. Chengdu is a beautiful city and there are many places for sightseeing, such as Giant Panda Breeding Research Base, Giant Buddha, Jiuzhaigou National Park, etc. ISBAST 2013 will be organized by the Southwest Jiaotong University and National Taiwan University of Science and Technology.

We are inviting new and unpublished papers on, but not limited to, the following topics:

* Cloud Computing Security cloud standards, cloud reliability, secure cloud computing, cloud management, cloud databases, private vs. public clouds, cloud internetworking, virtual private inter-cloud, cloud applications

* Fault Tolerant and Dependable Computing survivability quantification, security quantification, self-healing, self-protecting and fault-tolerant, software aging and rejuvenation, safety-critical systems and software, architecture and system design for dependability, fault tolerant algorithms and protocols, tools for design and evaluation of dependable systems

* Biometrics Technologies face, gait, vein, fingerprint, palmprint, speech, voice, iris, signature, multimodal biometric fusion

* Biometrics Performance Evaluation confidence interval estimation, performance modeling and prediction, protocols and benchmarks, standards


Important Dates

Full paper submission Feburary 10, 2013
Notification March 15, 2013
Camera-ready paper and registration March 31, 2013


* Information Security in Internet digital rights management, copyright protection scheme, access control, database security, cryptographic protocols, distributed systems security, intrusion detection and avoidance, secure electronics commence, data & system integrity, privacy and anonymity, authentication, security and protection of IT infrastructure, wireless network security, multimedia security, digital forensics, watermarking, cryptography, virus detection and prevention, image copyright protection
* Biometrics Applications travel and transportation, homeland security, banking and finance, maritime/airport security, automobile security, RFID and smart cards, boarder control, healthcare, access control, law enforcement, cybersecurity, encryption and watermarking
* Others


http://isbast13.csie.ntust.edu.tw/CFP%20ISBAST13-04-09-12draft.pdf


Related Resources

SITAIBA 2025   2025 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications
Ei/Scopus-CCNML 2025   2025 5th International Conference on Communications, Networking and Machine Learning (CCNML 2025)
ICINT 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
CETA 2025   IEEE--2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
ICINT--EI 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ITCCMA 2025   12th International Conference on Information Technology, Control, Chaos, Modeling and Applications
AIIT 2025   XV International Conference on Applied Internet and Information Technologies
ICOCT 2025   2025 5th International Conference on Optics and Communication Technology-EI Compendex/Scopus
PDCAT 2025   Parallel and Distributed Computing: Applications and Technologies
ICCPR 2025   ACM--2025 14th International Conference on Computing and Pattern Recognition (ICCPR 2025)