*Last Update: November 30, 2011  

Call for Papers | Call for Special Sessions | Call for Workshop | Call for Tutorial Participant | Paper Submissions

1 Malaysia    HIS 2011

  

» HOME » CALL FOR PAPERS » IMPORTANT DATES » PAPER SUBMISSIONS » CAMERA-READY GUIDELINES » INVITED SPEAKERS » TECHNICAL PROGRAM » DOWNLOAD » COMMITTEE » SPONSORSHIPS » REGISTRATION » CONFERENCE VENUE » HOW TO GET TO MELAKA » ACCOMMODATION » SOCIAL PROGRAMS » LOCAL INFORMATION » CONTACT US

JOURNAL SPECIAL ISSUES

Related Conference:

HIS 2011

C A L L    F O R   P A P E R S 

'Innovative Cyber Security: Protecting Nations Beyond Borders'

Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals.

The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field.

Information Assurance, Security Mechanisms, Methodologies and Models
Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptography
Cryptographic Protocols
Key Management and Recovery

Secure System Architectures and Security Application
Web Services Security
Grid Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards

Image Engineering, Multimedia Signal Processing and Communication Security
Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Biometrics
Information Fusion
Image Registration
Image Mosaic
Image Indexing and Retrieval
Image and Video Coding
Multiscale Geometric Analysis
Motion Detection and Tracing
Feature Extraction
3G Communication
Embedded System Design


Author guidelines:

A full paper (6 pages, A4 size) for oral presentation should be formatted following the IEEE format. Formating instructions :
Word and LaTeX.

Please click here to download the CFP.