posted by user: To7_ || 3436 views || tracked by 11 users: [display]

ITS 2010 : International Conference on Information Technology Security

FacebookTwitterLinkedInGoogle

Link: http://www.itsecurityconf.org/
 
When Nov 29, 2010 - Nov 30, 2010
Where Phuket Beach Resort, Thailand
Submission Deadline Oct 7, 2010
Notification Due Oct 12, 2010
Categories    information technology   computer science
 

Call For Papers

FIRM DEADLINE(7 Oct): ITS 2010 CALL FOR PAPERS

Annual International Conference on Information Technology Security
http://www.itsecurityconf.org/

Date: 29-30 November 2010
Venue: Phuket Beach Resort, Thailand


[HIGHLIGHTS]

•The conference proceedings will be indexed by / included in CiteSeerX, SCIrus, Google Scholar, getCITED and EBSCO. In addition, they will be submitted to IEEE xplore, ACM Digital Library, EI Compendex, and ISTP for indexing/inclusion subject to acceptance / approval.

•Selected papers will be published in GSTF International Journal on Computing (JoC) and GSTF associated journals subject to extension/acceptance.

•Best Paper Awards and Best Student Paper Awards will be conferred at the conference (in order to qualify for the award, the paper must be presented at the conference).

[TOPICS]

Topics of interests include, but are not limited to:

•Security of Web-based applications and services
•Anti-malware techniques: detection, analysis, and prevention
•Intrusion prevention, detection, and response
•Security for electronic voting
•Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
•Privacy and anonymity technologies
•Network perimeter controls: firewalls, packet filters, and application gateways
•Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
•Security for Vehicular Ad-hoc Networks (VANETs)
•Security for peer-to-peer and overlay network systems
•Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
•Implementation, deployment and management of network security policies
•Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
•Integrating security services with system and application security facilities and protocols
•Public key infrastructures, key management, certification, and revocation
•Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
•Security for collaborative applications: teleconferencing and video-conferencing
•Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
•Security for large-scale systems and critical infrastructures
•Integrating security in Internet protocols: routing, naming, network management


[CONFERENCE CHAIR]

Prof. Stephen Martin
Former Deputy Vice Chancellor, Curtin University of Technology
Former Pro Vice Chancellor International, Victoria University
Former Speaker, Parliament of Australia


[PROGRAM CO-CHAIRS]

Prof. P.K. Kapur
Head, Department of Operational Research, Dean, Faculty of Mathematical Science, University of Delhi

Dr. Xu Wang
School of Engineering and Physical Sciences, Heriot Watt University, United Kingdom


[EDITOR-IN-CHIEF]

Prof. A. S. M. Sajeev
Chair of IT/Computer Science, University of New England, Armidale, Australia


[PROGRAM COMMITTEE]

Prof. Bharat Bhargava
Purdue University, USA

Prof. Selwyn Piramuthu
University of Florida, USA

Assoc. Prof. Ofer Zwikael
The Australian National University Canberra, Australia

Prof. SH (Basie) von Solms
University of Johannesburg, South Africa

Prof. Margaret Tan
Nanyang Technological University Singapore, Singapore

Assoc. Prof. Junbin Gao
Charles Sturt University, Australia

Dr. Udayan Chanda
Asia-Pacific Institute of Management, Delhi, India

Dr. Youngjae Kim
Oak Ridge National Laboratory (ORNL), Knoxville, TN, USA

Asst. Prof Di Ma
University of Michigan, Dearborn, USA

Peter Palensky
Austrian Institute of Technology (AIT)

Dr. Wan D. Bae
University of Wisconsin-Stout, USA


[IMPORTANT DATES]

Paper Submission Deadline(Firm) 07 Oct 2010
Notification of Paper Acceptance 12 Oct 2010
Deadline for Early-Bird Registration 01 Nov 2010
Deadline for Late Registration* 19 Nov 2010
Conference Dates 29-30 Nov 2010


[CONTACT INFORMATION]

Website : www.itsecurityconf.org/
Email : info@itsecurityconf.org
DID : +65 6327 0166/161
FAX : +65 6327 0162

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)
CTISC 2024   2024 6th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2024) -EI Compendex
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
MLANN 2024   2024 2nd Asia Conference on Machine Learning, Algorithms and Neural Networks (MLANN 2024)
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
ACM-Ei/Scopus-CMLDS 2024   2024 International Conference on Computing, Machine Learning and Data Science (CMLDS 2024)