September 15-18, 2008
Taipei, Taiwan
Website http://isc08.twisc.org/index.html
Information Security 每年一度的盛事, 今年剛好在台灣舉辦, 研討會的 Topics 包含了我們的研究領域 - Information Hiding, ( 另一個重要的國際研討會是 IHW, Information Hiding Workshop, 今年 May 19-21 在 Santa Barbara, California, USA 舉辦, 論文截稿日期是 February 2, 2008 早就已經 來不及了 )。
今年 ISC 原本的 Submission Deadline 是 March 1, 2008, 我的論文原先的規劃是準備投稿到屬於 WCE 2008 的 ICISOIE 08 , 昨天其實已經將論文改成 WCE 2008 的六頁格式, 準備今天投稿出去。早上開車到學校的路上, 就一直在考慮改投到 ISC 08, 在車上和黃世育老師討論後, 決定將我們一起合作寫的兩篇論文分散到兩個研討會, 黃老師寫的 CAPTCHA 那篇, 照原定計畫投稿的 WCE 2008, 我寫的這篇 Modified LSB Embedding 改投到 ISC 08, 兩個研討會都要參加。
昨天花了一整天, 將論文調整成 WCE 2008 的格式, 決定改投之後, 今天又要把論文格式重新改成 ISC 08 的格式了。
Call for papers
Important Dates
Conference Dates: September 16-18, 2008
Submission Deadline: March 15, 2008, 11pm GMT (firm deadline)
Notification of Acceptance: May 20, 2008
Camera-ready Copies Deadline: June 15, 2008
Topics of Interest
ISC aims to attract high quality papers in all technical aspects of information security.
Topics of interest include, but are not limited to, the following:
* Access Control
* Accounting and Audit
* Anonymity and Pseudonymity
* Applied Cryptography
* Attacks and Prevention of Online Fraud
* Authentication and Non-repudiation
* Biometrics
* Cryptographic Protocols and Functions
* Database and System Security
* Design and Analysis of Cryptographic Algorithms
* Digital Rights Management
* Economics of Security and Privacy
* Formal Methods in Security
* Foundations of Computer Security
* Identity and Trust Management
* Information Hiding and Watermarking
* Infrastructure Security
* Intrusion Detection, Tolerance and Prevention
* Mobile, Ad Hoc and Sensor Network Security
* Network and Wireless Network Security
* Peer-to-Peer Network Security
* PKI and PMI
* Private Searches
* Security and Privacy in Pervasive/Ubiquitous Computing
* Security in Information Flow
* Security for Mobile Code
* Security of Grid Computing
* Security of eCommerce, eBusiness and eGovernment
* Security Modeling and Architectures
* Security Models for Ambient Intelligence environments
* Trusted Computing
* Usable Security
No comments:
Post a Comment