posted by user: gblanc || 9281 views || tracked by 15 users: [display]

JWIS 2010 : The 5th Joint Workshop on Information Security

FacebookTwitterLinkedInGoogle

Link: http://xy.scau.edu.cn/info/jwis2010/call-for-papers.aspx
 
When Aug 5, 2010 - Aug 6, 2010
Where Guangzhou, China
Submission Deadline May 14, 2010
Notification Due Jun 21, 2010
Final Version Due Jul 8, 2010
Categories    security   information security
 

Call For Papers

Call For Papers
JWIS 2010
The Fifth Joint Workshop on Information Security
August 5-6, 2010
South China Agricultural University
Guangzhou, China
http://xy.scau.edu.cn/info/jwis2010/

The 5th Joint Workshop on Information Security (JWIS 2010) will be held in Guangzhou, China on August 5 (Thursday) – 6 (Friday), 2010. The focus of this workshop is on the technical and practical aspects of the security applications. The workshop will serve as a forum to present new results from the academic research community as well as from the industry. Original papers are solicited for submission to JWIS 2010. In addition, several distinguished security experts will be invited to give technical talks

* The topics of interest include, but not limited to: Network Security

NGN Security, IDS/IPS, Home Network Security, Networked RFID Security, Sensor Network Security, Telemetric Security, Mobile Internet Security, IPv6 Security, P2P Security, Wireless LAN Security, Ad hoc Network Security
* System Security

Database Security, System Software Security, Secure e-health, Secure Middleware, Operating System Security, Ubiquitous Security
* Application Security

Anti-SPAM or Combating SPAM, Anti-phishing, Web Services Security (SAML, XACML), VoIP Security
* ID Management and Privacy Controls
* Biometrics
* Security Engineering
* Information Security Management

Human Resource Security
* IT Assurance
* Security Policy
* Security Standards

* Important Dates Paper submission deadline : May 14, 2010
* Acceptance notification : June 21, 2010
* Final manuscript deadline : July 8, 2010

* Instructions for Authors

Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS" (http://www.springer.de/comp/lncs/authors.html) and limited to at most 15 pages in total. Papers must be submitted electronically. Authors of accepted papers must give oral presentation at the workshop.

Related Resources

ICCDA--Ei 2023   2023 The 7th International Conference on Computing and Data Analysis (ICCDA 2023)
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
IJCNN 2023   International Joint Conference on Neural Networks
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
NeTCoM 2023   15th International Conference on Networks & Communications
EI-ISoIRS 2022   2022 3rd International Symposium on Intelligent Robotics and Systems (ISoIRS 2022)
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
IJU 2022   International Journal of Ubiquitous Computing