Tag: sca

Sep 01

IEEE Publication – Journal Special Issues


Deadline for Paper Submission: September 20, 2011
Notification of Acceptance: October 15, 2011
Camera ready submission and author registration: October 31, 2011
Publication: IEEE
Journal Special Issues:
Authors of accepted papers presented at IAS 2011 will be invited to submit extended versions of their manuscripts for consideration in the following international journals:
Journal of Information Assurance and Security, USA
International Journal of Wireless and Mobile Computing (IJWMC),
Inderscience Publishers, Switzerland
International Journal of Computer Information Systems and Industrial
Management (IJCISIM), USA
7th International Conference on Information Assurance and Security (IAS'11)
Melaka, Malaysia
December 5-8, 2011
Technically Sponsored by:
IEEE Systems, Man and Cybernetics Society (SMCS) – Spain Chapter
IEEE Systems, Man and Cybernetics Society (SMCS) – Czechoslovakia Chapter
Technically Supported by:
IEEE Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Soft Computing Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Homeland Security
Publication: IEEE
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information assurance and security to exchange ideas and to learn the latest development in this important field. The 4-day conference will feature prominent keynote speakers, workshop, tutorials, poster and paper presentation in parallel tracks. HIS 2011 invites novel contributions/papers of Information Assurance and Security from fundamental aspects to various practical applications.
** Information Assurance, Security Mechanisms, Methodologies and Models **
Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptographic Protocols
Key Management and Recovery
** Secure System Architectures and Security Application **
Web Services Security
Grid Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards
** Image Engineering, Multimedia Signal Processing and Communication Security **
Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Information Fusion
Image Registration
Image Mosaic
Image Indexing and Retrieval
Image and Video Coding
Multiscale Geometric Analysis
Motion Detection and Tracing
Feature Extraction
3G Communication
Embedded System Design
Author Guidelines:
Submission of paper should be made through the submission link in IAS 2011 official website or the easychair conference system at: https://www.easychair.org/account/signin.cgi?conf=ias11
Please refer to the conference website for guidelines to prepare your manuscript. All accepted papers will be compiled in conference proceedings published by the IEEE. It is mandatory at least an author registers for every paper that is included in the conference proceedings. Proceedings will be made available during the conference.
IAS 2011 Organizing team:
General Chairs
Ajith Abraham, MIR Labs, Europe
Daniel Zeng, University of Arizona, USA
Dharma Agrawal, University of Cincinatti, USA
Information Contact:
Azah Kamilah Muda, UTeM, Malaysia

Aug 29

Scariest IPv6 attack scenarios | Computerworld New Zealand

Scariest IPv6 attack scenarios | Computerworld New Zealand.

May 07

Where Did That Scammer Get Your Email Address? — Krebs on Security

Where Did That Scammer Get Your Email Address? — Krebs on Security.

May 07

Scammers Swap Google Images for Malware — Krebs on Security

Scammers Swap Google Images for Malware — Krebs on Security.

Apr 11

Journal: Communications and Network

Communications and Network is an international, peer-reviewedopen access, online journal, publishing original research, reports, reviews and commentaries on all areas about Communications and Network. And it has been indexed by several world class databases, such as The Library of Congress, Gale, EBSCO, Proquest, IndexCopernicus, CrossRef, Google Scholar and CSP, etc. For more information, please visit journal homepage: www.scirp.org/journal/cn.

Communications and Network is published by Scientific Research Publishing (SRP:www.scirp.org) which was established in 2007 and currently has more than 100 journals. SRP specializes in the rapid publication of quality peer-reviewed journals across the broad spectrum of science, technology, life science and medicine.

Aims & Scope

  • Algorithms and Programs
  • Cognitive Radio
  • Complexity
  • Cooperative Communications
  • Error Correcting Codes
  • Green Technology
  • High Performance Computing, Grid Computing, Cloud Computing
  • Internet/Intranet Services
  • Mobile and Portable Communications Systems
  • Mobility Networks and Protocols
  • Multi Antenna/User Systems
  • Network Protocol, QoS and Congestion Control
  • Optical Communications
  • Self-Stabilization, Autonomic Computing
  • Source Coding/Data Compression
  • Synchronization
  • Traffic Diagnosis
  • Wired and Wireless Integration
  • Applications and Value-Added Services
  • Communication Protocols
  • Computer and Network Security
  • Data and Information Security
  • Fading/Equalization
  • Hardware and Software System Architecture
  • Internet/Intranet Protocols
  • Location Based Services
  • Mobile Computing Systems
  • Modulation/Signal Design
  • Multimedia Services in Wireless Networks
  • Operations and Management
  • Overlay and Peer-to-Peer Networks
  • Simulation/Analytical Evaluation of Communication Systems
  • Switching and Routing
  • Shared and Transactional Memory, Synchronization Protocols, Concurrent Programming
  • Transmission and Access Systems
  • Wireless Network Design and Performance Evaluation

Editorial Board

Editor in Chief  
Prof.Hamed Al-Raweshidy Brunel University, UK
Editorial Board  
Prof.Photios Anninos Democritus University of Thrace, Greece
Dr.Bharat Bhargava Purdue University, USA
Prof.Ruay-Shiung Chang National Dong Hwa University, Taiwan (China)
Dr.Ai Chen Chinese Academy Of Sciences, China
Dr.Xiaochun Cheng Middlesex University, UK
Dr.Yoon-Ho Choi Samsung Electronics Co. Ltd., Korea (South)
Dr.Nagy Ibrahim Elakalashy Minoufiya University, Egypt
Dr.Abdullah Eroglu Indiana University-Purdue University Fort Wayne, USA
Dr.Xiaopeng Fan Harbin Institute of Technology (HIT), China
Dr.Cunqing Hua Zhejiang University, China
Dr.Wiani Jaikla Suan Sunandha Rajabhat University, Thailand
Dr.Shanshan Jiang Broadcom Corporation, USA
Dr.Xiaohong Jiang Tohoku University, Japan
Dr.Rami Langar University of Pierre and Marie Curie, France
Dr.Yu Liu HK Applied Sci. & Tech. Research Institute (ASTRI), Hong Kong (China)
Prof.Hussein Mouftah University of Ottawa, Canada
Prof.Jean-Frederic Myoupo University of Picardie-Jules Verne, France
Dr.Lu Peng Louisiana State University, USA
Dr.Xiaojun Wang Dublin City University, Ireland
Dr.Jonathan Wellons Vanderbilt University, USA
Dr.Yong Xiang Deakin University, Australia
Dr.Hsiang-Fu Yu National Taipei University of Education, Taiwan (China)
Prof.Francesco Zirilli Sapienza Universita di Roma, Italy

Benefit of Open Access

For Authors: Gain increased visibility and ultimately a citation advantage.
For Readers: Keep abreast of the professional advancement free of charge.
For Institutions: Minimize the scientific investment on knowledge access
For Academia: Share the knowledge faster and on a larger scale;
Accelerate the development of a given field.
For Society: Minimize the cost and time of information exchange;
Speed up the process of converting scientific results to productive force;
Enable the public to benefit more rapidly from the advance of science and technology;
Narrow the gap between the developed and developing countries.

Jan 06

Documents et Liens Utiles