Call for Papers
Call for Papers
Theme: 'Innovative Cyber Security: Protecting Nations Beyond Borders'
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals.
The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field.
Information Assurance, Security Mechanisms, Methodologies and Models
Secure System Architectures and Security Application
Image Engineering, Multimedia Signal Processing and Communication Security
Author guidelines:
Theme: 'Innovative Cyber Security: Protecting Nations Beyond Borders'
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals.
The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information security and assurance to exchange ideas and to learn the latest development in this important field.
Information Assurance, Security Mechanisms, Methodologies and Models
- Authentication and Identity
- Management Authorization and Access Control
- Trust Negotiation, Establishment and Management
- Anonymity and User Privacy
- Data Integrity and Privacy
- Network Security
- Operating System Security
- Database Security
- Intrusion Detection
- Security Attacks
- Security Oriented System Design
- Security and Performance trade-off
- Security Management and Strategy
- Security Verification, Evaluations and Measurements
- Secure Software Technologies
- New Ideas and Paradigms for Security
- Cryptography
- Cryptographic Protocols
- Key Management and Recovery
Secure System Architectures and Security Application
- Web Services Security
- Grid Security
- Ubiquitous Computing Security
- Mobile Agent Security
- Internet Security
- Intellectual Property Protection
- E-Commerce Security
- E-Government Security
- E-Health Security
- Home System Security
- Sensor Network Security
- Ad hoc network security
- Biometrics Security and Applications
- Secure Hardware and Smartcards
Image Engineering, Multimedia Signal Processing and Communication Security
- Multimedia Security
- Multimedia Forensic
- Digital Watermarking and DRM
- Communication Security
- Biometrics
- Information Fusion
- Image Registration
- Image Mosaic
- Image Indexing and Retrieval
- Image and Video Coding
- Multiscale Geometric Analysis
- Motion Detection and Tracing
- Feature Extraction
- 3G Communication
- Embedded System Design
Author guidelines:
Proceedings are expected to be published by:
Advances in Intelligent and Soft Computing, which is now indexed by ISI Proceedings, DBLP. Ulrich's, EI-Compendex, SCOPUS, Zentralblatt Math, MetaPress, Springerlink
Papers maximum length is 10 pages.
- Papers must be formatted according to Springer format (Latex/word) available at: http://www.springer.com/series/11156