Tag: apt

Sep 01

IEEE Publication – Journal Special Issues


Deadline for Paper Submission: September 20, 2011
Notification of Acceptance: October 15, 2011
Camera ready submission and author registration: October 31, 2011
Publication: IEEE
Journal Special Issues:
Authors of accepted papers presented at IAS 2011 will be invited to submit extended versions of their manuscripts for consideration in the following international journals:
Journal of Information Assurance and Security, USA
International Journal of Wireless and Mobile Computing (IJWMC),
Inderscience Publishers, Switzerland
International Journal of Computer Information Systems and Industrial
Management (IJCISIM), USA
7th International Conference on Information Assurance and Security (IAS'11)
Melaka, Malaysia
December 5-8, 2011
Technically Sponsored by:
IEEE Systems, Man and Cybernetics Society (SMCS) – Spain Chapter
IEEE Systems, Man and Cybernetics Society (SMCS) – Czechoslovakia Chapter
Technically Supported by:
IEEE Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Soft Computing Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Homeland Security
Publication: IEEE
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information assurance and security to exchange ideas and to learn the latest development in this important field. The 4-day conference will feature prominent keynote speakers, workshop, tutorials, poster and paper presentation in parallel tracks. HIS 2011 invites novel contributions/papers of Information Assurance and Security from fundamental aspects to various practical applications.
** Information Assurance, Security Mechanisms, Methodologies and Models **
Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptographic Protocols
Key Management and Recovery
** Secure System Architectures and Security Application **
Web Services Security
Grid Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards
** Image Engineering, Multimedia Signal Processing and Communication Security **
Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Information Fusion
Image Registration
Image Mosaic
Image Indexing and Retrieval
Image and Video Coding
Multiscale Geometric Analysis
Motion Detection and Tracing
Feature Extraction
3G Communication
Embedded System Design
Author Guidelines:
Submission of paper should be made through the submission link in IAS 2011 official website or the easychair conference system at: https://www.easychair.org/account/signin.cgi?conf=ias11
Please refer to the conference website for guidelines to prepare your manuscript. All accepted papers will be compiled in conference proceedings published by the IEEE. It is mandatory at least an author registers for every paper that is included in the conference proceedings. Proceedings will be made available during the conference.
IAS 2011 Organizing team:
General Chairs
Ajith Abraham, MIR Labs, Europe
Daniel Zeng, University of Arizona, USA
Dharma Agrawal, University of Cincinatti, USA
Information Contact:
Azah Kamilah Muda, UTeM, Malaysia

May 27

Des chercheurs s’attaquent aux captchas de Microsoft, eBay et Yahoo!

Des chercheurs s’attaquent aux captchas de Microsoft, eBay et Yahoo!.

May 25

Researchers find irreparable flaw in popular CAPTCHAs • The Register

Researchers find irreparable flaw in popular CAPTCHAs • The Register.

Apr 07

Installing KeePass Password Safe 2.x on Crunchbang Linux (debian)

KeePass Password Safe 2.x is an open-source password management utility for Microsoft Windows, compatible with Linux, Mac OS X, and a variety of other systems via mono. (http://en.wikipedia.org/wiki/KeePass)

As described on KeePass's setup instruction page, it is possible to run the software under Linux (and more) using mono. Since other required packages are mentionned without their specific names for Crunchbang Linux (or more generally Debian), I though I would share the results of my researches with you.

To install the required package, just execute one of the two following commands in a terminal:

  • sudo aptitude install mono-2.0-devel libmono-winforms2.0-cil xdotool libmono-system-runtime2.0-cil
  • sudo apt-get install mono-2.0-devel libmono-winforms2.0-cil xdotool libmono-system-runtime2.0-cil


Alternative programs: Password Safe, KeePassX, Password Gorilla

Mar 25

International Conference on Information Society (i-Society 2011)


International Conference on Information Society

(i-Society 2011)

June 27-29, 2011, London, UK



The International Conference on Information Society (i-Society 2011) is Technical Co-Sponsored by IEEE UK/RI Computer Chapter. The i-Society 2011 is a global knowledge-enriched collaborative effort that has its roots from both academia and industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.

The mission of i-Society 2011 conference is to provide opportunities for collaboration of professionals and researchers to share existing and generate new knowledge in the field of information society. The conference encapsulates the concept of interdisciplinary science that studies the societal and technological dimensions of knowledge evolution in digital society. The i-Society bridges the gap between academia and industry with regards to research collaboration and awareness of current development in secure information management in the digital society.

The topics in i-Society 2011 include but are not confined to the following areas:

New Enabling Technologies

  • Internet technologies
  • Wireless applications
  • Mobile Applications
  • Multimedia Applications
  • Protocols and Standards
  • Ubiquitous Computing
  • Virtual Reality
  • Human Computer Interaction
  • Geographic information systems
  • e-Manufacturing

Intelligent Data Management

  • Intelligent Agents
  • Intelligent Systems
  • Intelligent Organisations
  • Content Development
  • Data Mining
  • e-Publishing and Digital Libraries
  • Information Search and Retrieval
  • Knowledge Management
  • e-Intelligence
  • Knowledge networks

Secure Technologies

  • Internet security
  • Web services and performance
  • Secure transactions
  • Cryptography
  • Payment systems
  • Secure Protocols
  • e-Privacy
  • e-Trust
  • e-Risk
  • Cyber law
  • Forensics
  • Information assurance
  • Mobile social networks
  • Peer-to-peer social networks
  • Sensor networks and social sensing


  • Collaborative Learning
  • Curriculum Content Design and Development
  • Delivery Systems and Environments
  • Educational Systems Design
  • e-Learning Organisational Issues
  • Evaluation and Assessment
  • Virtual Learning Environments and Issues
  • Web-based Learning Communities
  • e-Learning Tools
  • e-Education


  • Data Security Issues
  • e-Health Policy and Practice
  • e-Healthcare Strategies and Provision
  • Medical Research Ethics
  • Patient Privacy and Confidentiality
  • e-Medicine


  • Legal Issues
  • Patents
  • Enabling technologies and tools


  • Natural sciences in digital society
  • Biometrics
  • Bioinformatics
  • Collaborative research

Industrial Developments

  • Trends in learning
  • Applied research
  • Cutting-edge technologies

Application of Choatic Computing

  • Chaos-Based Data Security


  • Global Trends
  • Social Inclusion
  • Intellectual Property Rights
  • Social Infonomics
  • Computer-Mediated Communication
  • Social and Organisational Aspects
  • Globalisation and developmental IT
  • Social Software


  • Democracy and the Citizen
  • e-Administration
  • Policy Issues
  • Virtual Communities


  • Digital Economies
  • Knowledge economy
  • eProcurement
  • National and International Economies
  • e-Business Ontologies and Models
  • Digital Goods and Services
  • e-Commerce Application Fields
  • e-Commerce Economics
  • e-Commerce Services
  • Electronic Service Delivery
  • e-Marketing
  • Online Auctions and Technologies
  • Virtual Organisations
  • Teleworking
  • Applied e-Business
  • Electronic Data Interchange (EDI)

Research in Progress

  • Ongoing research from undergraduates, graduates/postgraduates and professionals
  • Projects
  • Collaborative Research