| 查看: 670 | 回复: 6 | ||
| 【奖励】 本帖被评价3次,作者gjliu增加金币 2.5 个 | ||
| 当前主题已经存档。 | ||
[资源]
【原创】CFP:First International Workshop on Network Steganography
|
||
|
大家帮忙宣传一下啊,呵呵 Call for Papers ************************************************************************** First International Workshop on Network Steganography - IWNS 2009 November 18-20, 2009, Wuhan, Hubei, China co-located with International Conference on Multimedia Information Networking and Security (MINES 2009) http://stegano.net/workshop ************************************************************************** Network steganography is part of information hiding focused on modern networks and is a method of hiding secret data in users' normal data transmissions, ideally, so it cannot be detected by third parties. Steganographic techniques arise and evolve with the development of network protocols and mechanisms, and are expected to used in secret communication or information sharing. Now, it becomes a hot topic due to the wide spread of information networks, e.g., multimedia service networks and social networks. The workshop is dedicated to capture such areas of research as steganography, steganalysis, and digital forensics in the meaning of network covert channels, investigate the potential applications, and discuss the future research topics. Research themes of workshop will include: - Steganography and steganalysis - Covert/subliminal channels - Novel applications of information hiding in networks - Political and business issues in network steganography - Information hiding in multimedia services - Digital forensics - Network communication modelling from the viewpoint of steganography and steganalysis - New methods for eliminating network steganography PAPER SUBMISSION AND PUBLICATION Papers will be accepted based on peer review and should contain original, high quality work. All papers must be written in English. A paper should not exceed 5 pages (two columns IEEE format), including figures and references with 10-12 point font. Submission page: http://www.easychair.org/conferences/?conf=mines2009 The papers will be published by IEEE Computer Society Press, available in the conference (MINES 2009), and indexed by EI Compendex and ISTP. The extended versions of high-quality papers selected from the workshop will be published in a special issue of Telecommunication Systems: Modelling, Analysis, Design and Management by Springer-Verlag GmbH (indexed by ISI Master Journal List). DATES Manuscript Due: June 10, 2009 Acceptance Notification: July 15, 2009 Final Manuscript Due: July 30, 2009 Registration Due: August 10, 2009 WORKSHOP CHAIRS Krzysztof Szczypiorski, Warsaw University of Technology, Poland Shiguo Lian, France Telecom R&D (Orange Labs) Beijing, China Wojciech Mazurczyk, Warsaw University of Technology, Poland PROGRAMM COMMITTEE Krzysztof Cabaj, Warsaw University of Technology, Poland Steve Chapin, Syracuse University, USA Costas Constantinou, University of Birmingham, UK Nicolas T. Courtois, University College London, UK Lech Janczewski, University of Auckland, New Zealand Paul Kiddie, University of Birmingham, UK Piotr Kijewski, NASK/CERT Polska, Poland Jerzy Konorski, Gdansk University of Technology, Poland Igor Kotenko, Russian Academy of Sciences, Russia Zbigniew Kotulski, Warsaw University of Technology and IPPT PAN, Poland Deepa Kundur, Texas A&M University, USA Miroslaw Kutylowski, Wroclaw Universtity of Technology, Poland Ke Liao, Institute of Electronics, Chinese Academy of Sciences, China Guangjie Liu, Nanjing University of Science and Technology, China David Llamas, University of St Andrews, UK Jozef Lubacz, Warsaw University of Technology, Poland Norka Lucena, Syracuse University, USA Symeon Papavassiliou, National Technical University of Athens, Greece Josef Pieprzyk, Macquarie University, Australia Janusz Stoklosa, Poznan University of Technology, Poland Jinwei Wang, The 28th Research Institute of CETC, China Jozef Wozniak, Gdansk University of Technology, Poland Konrad Wrona, NATO C3 Agency, Netherlands Xiaoyi Yu, Peking University, China |
» 猜你喜欢
推荐一本书
已经有7人回复
参与限项
已经有4人回复
有没有人能给点建议
已经有5人回复
假如你的研究生提出不合理要求
已经有12人回复
全日制(定向)博士
已经有5人回复
萌生出自己或许不适合搞科研的想法,现在跑or等等看?
已经有4人回复
Materials Today Chemistry审稿周期
已经有4人回复
对氯苯硼酸纯化
已经有3人回复
所感
已经有4人回复
要不要辞职读博?
已经有7人回复
2楼2009-05-18 18:02:09
3楼2009-05-18 20:43:45
4楼2009-05-22 14:38:42
5楼2009-06-11 18:19:12
|
该会议的投稿已经closed. 谢谢大家的关注。如果感兴趣请关注: 2009 International Workshop on Secure Multimedia Communication and Services (SECMCS'09) November 18–20, 2009, in Wuhan, China http://liss.whu.edu.cn/mines2009/SECMCS.htm To be held in conjunction with the 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), on November 18–20, 2009, in Wuhan, China. http://liss.whu.edu.cn/mines2009/ The previous event: 2008 International Workshop on Multimedia Security in Communication (MUSIC'08) http://www.music-com.org/ Introduction The rapid development of communication techniques allows us to transmit more than text/binary data in real time. While multimedia (image, video, audio, etc.) enriches human's daily life, its prosperity also attract malicious attackers and abusers with different motivations, such as political reasons, illegal financial benefits, or simply to win a prestige reputation in a hacker community. Nowadays, multimedia communication plays an important role in multiple areas in human society including entertainment, politics, economics, militaries, industries, etc. It is urgent to secure multimedia data by providing confidentiality, integrity, and ownership or identity. In the past decade, multimedia security has been a hot topic in the security research community. Various solutions have been reported, which address problems including data encryption, multimedia authentication, digital rights management (DRM), etc. However, due to some characteristics of multimedia content, such as large data volumes, interactive operations, and requires real-time responses, the problems multimedia security need to address are different from text/binary data security. Furthermore, multimedia security is highly services-dependable. Different services require different methods for content transmission or distribution, paying, interaction, etc. Particularly, new services have been emerging and new techniques are appearing, such as mobile TV, IPTV, IMS, VoIP, P2P living or download, convergence of mobile and Internet, etc. For instance, in mobile TV, the terminal's power should be considered when designing security functions; in P2P living, the requirement in a distributed architecture is different from the server-client mode. Additionally, multimedia content filtering should be considered to clean up the service system. Under the environment of network convergence, the smart means adaptive to different networks are expected. This workshop aims to bring together research work in the area of secure multimedia communication, investigate the novel solutions for secure multimedia services, and discuss the future trends for multimedia security in new services. Topics This workshop covers various aspects of secure multimedia communication in emerging services. The services may work in the following environment: Internet, mobile TV, IPTV, IMS, VoIP, P2P, sensor network, network convergence, etc. The paper may focus on architecture construction, algorithm designing or hardware implementation. Both review paper and technical paper are expected. The topics include but are not limited to: ² Lightweight multimedia encryption ² Secure multimedia adaptation ² Multimedia content authentication ² Sensitive content detection/filtering based on multimedia analysis ² Security threats or model for multimedia services ² Conditional Access and Digital Rights Management ² Key management/distribution in multimedia services ² Secure payment for multimedia services ² Secure user interface in multimedia services ² Secure telecom/broadcast convergence ² Secure mobile/Internet convergence ² Security in 3G/4G multimedia communication networks ² Security and privacy in multimedia sensor networks ² Security protocols or standards for multimedia communication ² Secure devices (set-top box, Smart Cards, SIM card, MID, etc.) ² Intrusion detection/prevention in multimedia systems ² Denial-of-Service (DoS) attacks in multimedia applications Submission The papers will be published by IEEE Computer Society Press, available in the conference. All published papers will be included in the IEEE Xplore database and indexed by well-known databases. Submission page: http://www.easychair.org/conferences/?conf=mines2009 (Workshop3: SECMCS'09) All papers must be written in English. A paper should not exceed 5 pages (two columns IEEE format), including figures and references with 10-12 point font. The submission should be done according to the guidelines on http://liss.whu.edu.cn/mines2009/. The revised or extended versions of the accepted and presented papers will be invited to the following International Journals: Multimedia Tools and Applications Journal of Internet Technology Electronic Commerce Research Important Dates Submission deadline: June 15, 2009 Notification date: July 20, 2009 Camera-ready due: July 31, 2009 Workshop dates: November 18-20, 2009 Honored Chairs Dr. Stefanos Gritzalis, University of the Aegean, Greece Dr. Borko Furht, Florida Atlantic University, USA General Chairs Dr. Yan Zhang, Simula Research Laboratory, Norway Email: yanzhang@ieee.org Dr. Shiguo Lian, France Telecom R&D Beijing Center, China Email: shiguo.lian@orange-ftgroup.com Technical Committee Chairs Dr. Zheng Yan, Nokia Research Center, Finland Email: Zheng.Z.Yan@nokia.com Dr. Husrev Taha SENCAR, TOBB Economy and Technology University, Turkey Email: tahasencar@gmail.com Publicity Chairs Dr. Yu Chen, State University of New York - Binghamton, USA Email: ychen@binghamton.edu Dr. Guangjie Liu, Nanjing University of Science and Technology Email: guangj_liu@yahoo.com.cn Technical Program Committee (to be continued) Andreas U. Schmidt, Create-Net, Italy Chin-Ling Chen, National Pingtung Institute of Commerce, Taiwan Chun-Shien Lu, Academia Sinica, Taiwan Costas Lambrinoudakis, University of the Aegean, Greece Di Jin, University of Oklahoma, USA El-Sayed El-Alfy, King Fahd University of Petroleum and Minerals, Saudi Arabia Eric Renault, Institut Telecom - Telecom SudParis, France Esther Palomar, Carlos III University, Spain George Kambourakis, University of the Aegean, Greece Giovanni Bodini, University of Rome Tor Vergata, Italy Igor Kotenko, SPIIRAS Russian Academy of Science, Russia Jiancheng Zou, North China University of Technology, China Jianhong Zhang, North China University of Technology, China Jiwu Huang, Sun Yat-Sen University, China Jong Hyuk Park, Kyungnam University, Korea Ju Liu, Shandong University, China Krzysztof Szczypiorski, Warsaw University of Technology, Poland L. Javier Garcia Villalba, Universidad Complutense de Madrid (UCM), Spain Mark Stamp, San Jose State University, USA Nenghai Yu, University of Science and Technology of China, China Noureddine BOUDRIGA, University of the 7th of November at Carthage, Tunisia Pu Liu, IBM, USA Rocky K. C. Chang, The Hong Kong Polytechnic University, China Rui Jiang, Southeast University, China Sasan Adibi, University of Waterloo, CA Selma Boumerdassi, CNAM CEDRIC Laboratory, France Shuiming Ye, University of Kentucky, USA Tarek BEJAOUI, University of Carthage, Tunisia Theodore Stergiou, KPMG Advisors AE, Greece Weiqi YAN, Queen’s University Belfast, UK Wei-Shinn Ku, Auburn University, USA Yao Zhao, Beijing Jiaotong University, China Yuting Su, Tianjing University, China Zhili Sun, University of Surrey, UK Zhiquan Wang, Nanjing University of Science and Technology, China Zhou Su, Waseda University, Japan |
6楼2009-06-11 23:53:40
7楼2009-06-11 23:54:11












回复此楼