posted by user: zusmani || 4479 views || tracked by 4 users: [display]

ISBAST 2013 : The 2013 International Symposium on Biometrics and Security Technologies

FacebookTwitterLinkedInGoogle

Link: http://isbast13.csie.ntust.edu.tw/CFP%20ISBAST-Final.pdf
 
When Jul 2, 2013 - Jul 5, 2013
Where Chengdu, Sichuan China
Submission Deadline Feb 10, 2013
Notification Due Mar 15, 2013
Final Version Due Mar 31, 2013
Categories    biometrics applications   cloud computing   biometrics performance evaluat   biometrics technologies
 

Call For Papers

ALL FOR PAPERS
IEEE INTERNATIONAL SYMPOSIUM ON BIOMETRICS & SECURITY TECHNOLOGIES (ISBAST'13)
2-5 July 2013, CHENGDU, CHINA
http://isbast13.csie.ntust.edu.tw

Selected papers will be considered for special issues in SCI/SCIE indexed international journals.

International Journal of Adhoc and Ubiquitous Computing (Inderscience), Journal of Internet Technology, Security & Communication Networks (Wiley), International Journal of Distributed Sensor Networks (Hindawi)


Currently, the applications of computer science are filled with our daily life therefore computer system security has become very important. The purpose of this conference is to provide a meeting forum for outstanding researchers to discuss with computing technology, biometric technology, and information security research. The conference not only covers the biometric identification, biometric authentication and information security related technologies, but also includes grid computing and cloud computing and other related issues. Meanwhile, we devoutly wish participants to learn the basic theory of a gradual approach, practical experimental data, new business models, and the latest academic trends from this conference.


Following the traditions of previous successful ISBAST conferences, the objective of ISBAST-13 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of biometric security technology and basic theoretical approach. ISBAST-13 is sponsored by IEEE Computer Society (Taipei Section) and proceedings will be published by the IEEE CS Press. ISBAST 2013 will be held in Chengdu, with a focus on two broad areas of Computing and Security Technologies. Chengdu is a beautiful city and there are many places for sightseeing, such as Giant Panda Breeding Research Base, Giant Buddha, Jiuzhaigou National Park, etc. ISBAST 2013 will be organized by the Southwest Jiaotong University and National Taiwan University of Science and Technology.

We are inviting new and unpublished papers on, but not limited to, the following topics:

* Cloud Computing Security cloud standards, cloud reliability, secure cloud computing, cloud management, cloud databases, private vs. public clouds, cloud internetworking, virtual private inter-cloud, cloud applications

* Fault Tolerant and Dependable Computing survivability quantification, security quantification, self-healing, self-protecting and fault-tolerant, software aging and rejuvenation, safety-critical systems and software, architecture and system design for dependability, fault tolerant algorithms and protocols, tools for design and evaluation of dependable systems

* Biometrics Technologies face, gait, vein, fingerprint, palmprint, speech, voice, iris, signature, multimodal biometric fusion

* Biometrics Performance Evaluation confidence interval estimation, performance modeling and prediction, protocols and benchmarks, standards


Important Dates

Full paper submission Feburary 10, 2013
Notification March 15, 2013
Camera-ready paper and registration March 31, 2013


* Information Security in Internet digital rights management, copyright protection scheme, access control, database security, cryptographic protocols, distributed systems security, intrusion detection and avoidance, secure electronics commence, data & system integrity, privacy and anonymity, authentication, security and protection of IT infrastructure, wireless network security, multimedia security, digital forensics, watermarking, cryptography, virus detection and prevention, image copyright protection
* Biometrics Applications travel and transportation, homeland security, banking and finance, maritime/airport security, automobile security, RFID and smart cards, boarder control, healthcare, access control, law enforcement, cybersecurity, encryption and watermarking
* Others


http://isbast13.csie.ntust.edu.tw/CFP%20ISBAST13-04-09-12draft.pdf


Related Resources

CYBER 2026   The Eleventh International Conference on Cyber-Technologies and Cyber-Systems
Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
MSIEID 2025   2025 7th Management Science Informatization and Economic Innovation Development Conference
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BDML 2025   2025 8th International Conference on Big Data and Machine Learning (BDML 2025)--ESCI
ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
Ei/Scopus-CNIOT 2026   2026 7th IEEE International Conference on Computing, Networks and Internet of Things (CNIOT 2026)
IoTBDS 2026   11th International Conference on Internet of Things, Big Data and Security
SOTICS 2026   The Sixteenth International Conference on Social Media Technologies, Communication, and Informatics