Conferences In Information Security

Conference Name 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security
Venue Linz, Austria
URL http://www.cms2010.net/cfp.html
Submission Deadline 11-Jan-10
Conference Date 31 May - 02 June, 2010
Sponsership/Publisher Austrian Computer Society
Aim/Scope/Research Area CMS’2010 is the 11th Conference in the ""Communications and Multimedia Security"" series. The series is a joint effort of IFIP Technical Committees TC6 (Communication Systems) and TC11 (Security and Privacy Protection in Information Processing Systems). The conference will be hosted by the Department Secure Information Systems of the Upper Austria University of Applied Sciences and will be located in Linz, Austria. The size of the programme committee, consisting of international experts in this field, proves the interest of the research community. Conference proceedings will be published by Springer. There will be a best paper award.
The conference provides a forum for engineers and scientists in information security. Both state-of-the-art issues and practical experiences as well as new trends in these areas will be once more the focus of interest just like at preceding conferences. This year, the conference will address in particular security and privacy issues in mobile contexts, web services (including social networking) and ubiquitous environments.
We solicit papers describing original ideas and research results on topics that include, but are not limited to:
applied cryptography
biometrics
secure documents and archives
multimedia systems security
digital watermarking
distributed DRM policies
attack resistant rendering engines
adaptive anomaly detection
censorship resistance
risk management
mobility and security/privacy
mobile identities
privacy enhanced identity management
security/privacy policies and preferences
social networks security/privacy
security/privacy in geo-localised applications
security/privacy in VoIP
web services security
SOA security
ubiquitous and ambient computing security
cloud computing security
wireless and ad hoc network security
RFID tags and sensor nodes security

Back To Conferences List

Database Sections