Conferences In Information Security
Conference Name | 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security |
---|---|
Venue | Linz, Austria |
URL | http://www.cms2010.net/cfp.html |
Submission Deadline | 11-Jan-10 |
Conference Date | 31 May - 02 June, 2010 |
Sponsership/Publisher | Austrian Computer Society |
Aim/Scope/Research Area |
CMS’2010 is the 11th Conference in the ""Communications and Multimedia Security"" series. The series is a joint effort of IFIP Technical Committees TC6 (Communication Systems) and TC11 (Security and Privacy Protection in Information Processing Systems). The conference will be hosted by the Department Secure Information Systems of the Upper Austria University of Applied Sciences and will be located in Linz, Austria. The size of the programme committee, consisting of international experts in this field, proves the interest of the research community. Conference proceedings will be published by Springer. There will be a best paper award.
The conference provides a forum for engineers and scientists in information security. Both state-of-the-art issues and practical experiences as well as new trends in these areas will be once more the focus of interest just like at preceding conferences. This year, the conference will address in particular security and privacy issues in mobile contexts, web services (including social networking) and ubiquitous environments. We solicit papers describing original ideas and research results on topics that include, but are not limited to: applied cryptography biometrics secure documents and archives multimedia systems security digital watermarking distributed DRM policies attack resistant rendering engines adaptive anomaly detection censorship resistance risk management mobility and security/privacy mobile identities privacy enhanced identity management security/privacy policies and preferences social networks security/privacy security/privacy in geo-localised applications security/privacy in VoIP web services security SOA security ubiquitous and ambient computing security cloud computing security wireless and ad hoc network security RFID tags and sensor nodes security |