24小时热门版块排行榜    

查看: 321  |  回复: 2
【奖励】 本帖被评价2次,作者gjliu增加金币 2
当前主题已经存档。

gjliu

银虫 (小有名气)


[资源] 【原创】Deadline of SECMCS 2009 postpone to June 20. plz ad. thanks

2009 International Workshop on Secure Multimedia Communication and Services (SECMCS'09)

November 18–20, 2009, in Wuhan, China

http://liss.whu.edu.cn/mines2009/SECMCS.htm



To be held in conjunction with the 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), on November 18–20, 2009, in Wuhan, China. http://liss.whu.edu.cn/mines2009/



The previous event: 2008 International Workshop on Multimedia Security in Communication (MUSIC'08) http://www.music-com.org/



Introduction

The rapid development of communication techniques allows us to transmit more than text/binary data in real time. While multimedia (image, video, audio, etc.) enriches human's daily life, its prosperity also attract malicious attackers and abusers with different motivations, such as political reasons, illegal financial benefits, or simply to win a prestige reputation in a hacker community. Nowadays, multimedia communication plays an important role in multiple areas in human society including entertainment, politics, economics, militaries, industries, etc. It is urgent to secure multimedia data by providing confidentiality, integrity, and ownership or identity. In the past decade, multimedia security has been a hot topic in the security research community. Various solutions have been reported, which address problems including data encryption, multimedia authentication, digital rights management (DRM), etc.

  However, due to some characteristics of multimedia content, such as large data volumes, interactive operations, and requires real-time responses, the problems multimedia security need to address are different from text/binary data security. Furthermore, multimedia security is highly services-dependable. Different services require different methods for content transmission or distribution, paying, interaction, etc. Particularly, new services have been emerging and new techniques are appearing, such as mobile TV, IPTV, IMS, VoIP, P2P living or download, convergence of mobile and Internet, etc. For instance, in mobile TV, the terminal's power should be considered when designing security functions; in P2P living, the requirement in a distributed architecture is different from the server-client mode. Additionally, multimedia content filtering should be considered to clean up the service system. Under the environment of network convergence, the smart means adaptive to different networks are expected. This workshop aims to bring together research work in the area of secure multimedia communication, investigate the novel solutions for secure multimedia services, and discuss the future trends for multimedia security in new services.



Topics

This workshop covers various aspects of secure multimedia communication in emerging services. The services may work in the following environment: Internet, mobile TV, IPTV, IMS, VoIP, P2P, sensor network, network convergence, etc. The paper may focus on architecture construction, algorithm designing or hardware implementation. Both review paper and technical paper are expected. The topics include but are not limited to:

²        Lightweight multimedia encryption

²        Secure multimedia adaptation

²        Multimedia content authentication

²        Sensitive content detection/filtering based on multimedia analysis

²        Security threats or model for multimedia services

²        Conditional Access and Digital Rights Management

²        Key management/distribution in multimedia services

²        Secure payment for multimedia services

²        Secure user interface in multimedia services

²        Secure telecom/broadcast convergence

²        Secure mobile/Internet convergence

²        Security in 3G/4G multimedia communication networks

²        Security and privacy in multimedia sensor networks

²        Security protocols or standards for multimedia communication

²        Secure devices (set-top box, Smart Cards, SIM card, MID, etc.)

²        Intrusion detection/prevention in multimedia systems

²        Denial-of-Service (DoS) attacks in multimedia applications



Submission

The papers will be published by IEEE Computer Society Press, available in the conference. All published papers will be included in the IEEE Xplore database and indexed by well-known databases.

Submission page: http://www.easychair.org/conferences/?conf=mines2009 (Workshop3: SECMCS'09)

All papers must be written in English. A paper should not exceed 5 pages (two columns IEEE format), including figures and references with 10-12 point font. The submission should be done according to the guidelines on http://liss.whu.edu.cn/mines2009/. The revised or extended versions of the accepted and presented papers will be invited to the following International Journals:

Multimedia Tools and Applications

Journal of Internet Technology

Electronic Commerce Research



Important Dates

Submission deadline: June 15, 2009

Notification date: July 20, 2009

Camera-ready due: July 31, 2009

Workshop dates: November 18-20, 2009



Honored Chairs

Dr. Stefanos Gritzalis, University of the Aegean, Greece

Dr. Borko Furht, Florida Atlantic University, USA



General Chairs

Dr. Yan Zhang, Simula Research Laboratory, Norway

Email: yanzhang@ieee.org



Dr. Shiguo Lian, France Telecom R&D Beijing Center, China

Email: shiguo.lian@orange-ftgroup.com



Technical Committee Chairs

Dr. Zheng Yan, Nokia Research Center, Finland

Email: Zheng.Z.Yan@nokia.com



Dr. Husrev Taha SENCAR, TOBB Economy and Technology University, Turkey

Email: tahasencar@gmail.com



Publicity Chairs

Dr. Yu Chen, State University of New York - Binghamton, USA

Email: ychen@binghamton.edu



Dr. Guangjie Liu, Nanjing University of Science and Technology

Email: guangj_liu@yahoo.com.cn





Technical Program Committee (to be continued)

Andreas U. Schmidt, Create-Net, Italy

Chin-Ling Chen, National Pingtung Institute of Commerce, Taiwan

Chun-Shien Lu, Academia Sinica, Taiwan

Costas Lambrinoudakis, University of the Aegean, Greece

Di Jin, University of Oklahoma, USA

El-Sayed El-Alfy, King Fahd University of Petroleum and Minerals, Saudi Arabia

Eric Renault, Institut Telecom - Telecom SudParis, France

Esther Palomar, Carlos III University, Spain

George Kambourakis, University of the Aegean, Greece

Giovanni Bodini, University of Rome Tor Vergata, Italy

Igor Kotenko, SPIIRAS Russian Academy of Science, Russia

Jiancheng Zou, North China University of Technology, China

Jianhong Zhang, North China University of Technology, China

Jiwu Huang, Sun Yat-Sen University, China

Jong Hyuk Park, Kyungnam University, Korea

Ju Liu, Shandong University, China

Krzysztof Szczypiorski, Warsaw University of Technology, Poland

L. Javier Garcia Villalba, Universidad Complutense de Madrid (UCM), Spain

Mark Stamp, San Jose State University, USA

Nenghai Yu, University of Science and Technology of China, China

Noureddine BOUDRIGA, University of the 7th of November at Carthage, Tunisia

Pu Liu, IBM, USA

Rocky K. C. Chang, The Hong Kong Polytechnic University, China

Rui Jiang, Southeast University, China

Sasan Adibi, University of Waterloo, CA

Selma Boumerdassi, CNAM CEDRIC Laboratory, France

Shuiming Ye, University of Kentucky, USA

Tarek BEJAOUI, University of Carthage, Tunisia

Theodore Stergiou, KPMG Advisors AE, Greece

Weiqi YAN, Queen’s University Belfast, UK

Wei-Shinn Ku, Auburn University, USA

Yao Zhao, Beijing Jiaotong University, China

Yuting Su, Tianjing University, China

Zhili Sun, University of Surrey, UK

Zhiquan Wang, Nanjing University of Science and Technology, China

Zhou Su, Waseda University, Japan
回复此楼
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

★★★★★ 五星级,优秀推荐

好长哦,慢慢看
2楼2009-06-13 00:14:04
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

bslt

金虫 (著名写手)


★★★★★ 五星级,优秀推荐

赞一个。。。
3楼2009-06-15 10:46:11
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 gjliu 的主题更新
☆ 无星级 ★ 一星级 ★★★ 三星级 ★★★★★ 五星级
普通表情 高级回复 (可上传附件)
信息提示
请填处理意见