posted by user: npatwari || 10623 views || tracked by 20 users: [display]

WIFS 2010 : IEEE International Workshop on Information Forensics and Security

FacebookTwitterLinkedInGoogle

Link: http://wifs10.org/CallForPapers.aspx
 
When Dec 12, 2010 - Dec 15, 2010
Where Seattle
Submission Deadline Jun 15, 2010
Categories    signal processing   forensics   security
 

Call For Papers


IEEE Workshop on Information Forensics and Security - WIFS'10
Seattle, December 12-15, 2010

Seattle, December 12-15, 2010

Call for Submissions

The IEEE International Workshop on Information Forensics and Security (WIFS) is the primary annual event organized by the IEEE’s Information Forensics and Security Technical Committee (IEEE IFS TC). WIFS is a venue for knowledge exchange that encompasses a broad range of disciplines and facilitates the exchange of ideas between various disparate communities that constitute information security. With this focus, we hope that researchers will identify new opportunities for collaboration across disciplines and gain new perspectives.



The conference will feature prominent keynote speakers, tutorials, and lecture sessions. Appropriate topics of interest include, but are not limited to:







. Computer security

o intrusion detection

o vulnerability analysis

o cloud security

. Biometrics

o emerging modalities

o fuzzy extractors

o attacks and countermeasures

. Cryptography for multimedia content

o multimedia encryption

o signal processing in the
encrypted domain

o traitor tracing codes

. Data hiding

o watermarking

o steganography and steganalysis

. Digital Rights Management (DRM)

o DRM primitives (secure clocks,
proximity detection, etc.)

o DRM architectures

o DRM interoperability

. Hardware Security

o Trojans

o Identification, PUFS

o Anti-counterfeiting





. Forensic analysis

o device identification

o data recovery

o validation of forensic evidence

. Network security

o monitoring, detection, response

o network tomography,

surveillance and traceback

. Usable Security, and usability aspects
of security
. Information Theoretical Security

. Privacy

o legal, ethical, social, and

economical issues

o anonymity

. (Video) surveillance:

o arrays of sensors design and

analysis, content tracking.

o events recognition, large crowd
behavior analysis

. Secure Applications

o e-Voting

o e-Commerce

o IPTV, VoIP, Medical




Schedule


· Tutorials (contact the tutorial chair by): May 15, 2010
· Papers (full paper, 4-6 pages): June 15, 2010
· Notification of acceptance by: August 15, 2010
· Camera-ready paper submission by: September 15, 2010


More information is available at www.wifs10.org

Related Resources

IEEE-ADMIT 2025   2025 IEEE 4th International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE ICEIT 2026   IEEE--2026 the 15th International Conference on Educational and Information Technology (ICEIT 2026)
IEEE- CCRIS 2025   2025 IEEE 6th International Conference on Control, Robotics and Intelligent System (CCRIS 2025)
ICCCBDA 2026   IEEE--2026 the 11th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2026)
Ei/Scopus-CCISS 2025   2025 2nd International Conference on Computing, Information Science and System (CCISS 2025)
ICIEE--EI 2026   2026 15th International Conference on Information and Electronics Engineering (ICIEE 2026)
CSTFM 2025   2025 International Conference on Smart Transportation and Future Mobility (CSTFM 2025)
DSIT 2025   2025 IEEE 8th International Conference on Data Science and Information Technology (DSIT 2025)
MIED 2025   2025 3rd International Academic Conference on Management Innovation and Economic Development