![]() |
| |||||||||||||||
ISBAST 2013 : The 2013 International Symposium on Biometrics and Security Technologies | |||||||||||||||
Link: http://isbast13.csie.ntust.edu.tw/CFP%20ISBAST-Final.pdf | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
ALL FOR PAPERS
IEEE INTERNATIONAL SYMPOSIUM ON BIOMETRICS & SECURITY TECHNOLOGIES (ISBAST'13) 2-5 July 2013, CHENGDU, CHINA http://isbast13.csie.ntust.edu.tw Selected papers will be considered for special issues in SCI/SCIE indexed international journals. International Journal of Adhoc and Ubiquitous Computing (Inderscience), Journal of Internet Technology, Security & Communication Networks (Wiley), International Journal of Distributed Sensor Networks (Hindawi) Currently, the applications of computer science are filled with our daily life therefore computer system security has become very important. The purpose of this conference is to provide a meeting forum for outstanding researchers to discuss with computing technology, biometric technology, and information security research. The conference not only covers the biometric identification, biometric authentication and information security related technologies, but also includes grid computing and cloud computing and other related issues. Meanwhile, we devoutly wish participants to learn the basic theory of a gradual approach, practical experimental data, new business models, and the latest academic trends from this conference. Following the traditions of previous successful ISBAST conferences, the objective of ISBAST-13 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of biometric security technology and basic theoretical approach. ISBAST-13 is sponsored by IEEE Computer Society (Taipei Section) and proceedings will be published by the IEEE CS Press. ISBAST 2013 will be held in Chengdu, with a focus on two broad areas of Computing and Security Technologies. Chengdu is a beautiful city and there are many places for sightseeing, such as Giant Panda Breeding Research Base, Giant Buddha, Jiuzhaigou National Park, etc. ISBAST 2013 will be organized by the Southwest Jiaotong University and National Taiwan University of Science and Technology. We are inviting new and unpublished papers on, but not limited to, the following topics: * Cloud Computing Security cloud standards, cloud reliability, secure cloud computing, cloud management, cloud databases, private vs. public clouds, cloud internetworking, virtual private inter-cloud, cloud applications * Fault Tolerant and Dependable Computing survivability quantification, security quantification, self-healing, self-protecting and fault-tolerant, software aging and rejuvenation, safety-critical systems and software, architecture and system design for dependability, fault tolerant algorithms and protocols, tools for design and evaluation of dependable systems * Biometrics Technologies face, gait, vein, fingerprint, palmprint, speech, voice, iris, signature, multimodal biometric fusion * Biometrics Performance Evaluation confidence interval estimation, performance modeling and prediction, protocols and benchmarks, standards Important Dates Full paper submission Feburary 10, 2013 Notification March 15, 2013 Camera-ready paper and registration March 31, 2013 * Information Security in Internet digital rights management, copyright protection scheme, access control, database security, cryptographic protocols, distributed systems security, intrusion detection and avoidance, secure electronics commence, data & system integrity, privacy and anonymity, authentication, security and protection of IT infrastructure, wireless network security, multimedia security, digital forensics, watermarking, cryptography, virus detection and prevention, image copyright protection * Biometrics Applications travel and transportation, homeland security, banking and finance, maritime/airport security, automobile security, RFID and smart cards, boarder control, healthcare, access control, law enforcement, cybersecurity, encryption and watermarking * Others http://isbast13.csie.ntust.edu.tw/CFP%20ISBAST13-04-09-12draft.pdf |
|