Conferences In Information Security

Conference Name First IEEE Workshop on Information Forensics and Security
Venue London, United Kingdom
URL http://www.wifs09.org/
Submission Deadline May 22nd, 2010
Conference Date 6-9 Dec , 2010
Sponsership/Publisher IEEE Signal Processing Society
Aim/Scope/Research Area The IEEE International Workshop on Information Forensics and Security (WIFS) is the first workshop to be organized by the IEEE’s Information Forensics and Security Technical Committee (IEEE IFS TC). It is intended to become an annual event. Our aspiration is to create a venue for knowledge exchange that encompasses a broad range of disciplines and facilitates the exchange of ideas between various disparate communities that constitute information security. By so doing, we hope that researchers will identify new opportunities for collaboration across disciplines and gain new perspectives.
The conference will feature prominent keynote speakers, tutorials, and lecture sessions. Appropriate topics of interest include, but are not limited to:
Biometrics: emerging modalities, recognition techniques, multimodal decision, attacks and countermeasures;
Computer security: intrusion detection, vulnerability analysis, system security;
Cryptography for multimedia content: perceptual hash function, multimedia encryption, signal processing in the encrypted domain, traitor tracing codes, key distribution;
Data hiding: watermarking, steganography and steganalysis, legacy system enhancement;
Digital Rights Management (DRM): DRM primitives (secure clocks, proximity detection, etc), DRM architectures, DRM interoperability;
Forensic analysis: device identification, data recovery, validation of forensic evidence;
Network security: privacy protection, network tomography and surveillance, system recovery from security/privacy failure;
Non technical aspects of security: legal, ethical, social and economical issues;
(Video) surveillance: arrays of sensors design and analysis, content tracking, events recognition, large crowd behaviour analysis;
Secure Applications: e-voting, e-commerce

Back To Conferences List

Database Sections