CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
Date:
Sun, 2 May 2010 14:32:17 +0900
Reply-To:
Sven Wohlgemuth <[log in to unmask]>
Subject:
MIME-Version:
1.0
Message-ID:
Content-Type:
text/plain; charset=UTF-8
From:
Sven Wohlgemuth <[log in to unmask]>
Content-Transfer-Encoding:
base64
Parts/Attachments:
text/plain (1 lines)
[Apologies if you receive multiple copies]



Dear participants of past IWSEC workshops:



I would like to announce the CFP for the next IWSEC workshop,

IWSEC 2010, November 22-24, 2010, Kobe, Japan.

The submission deadline has been extended to May 10th.

Please consider submission of your good papers to IWSEC 2010.



---------------------------------------------------------



IWSEC is the security workshop originated in Japan. 

This year's IWSEC (IWSEC 2010) will be held in Kobe, Japan

on November 22-24, 2010. Proceedings will be published 

from the Springer's LNCS series. 



IWSEC 2010 consists of the following 3 tracks:

 Track I  : Foundations of Security

 Track II : Security in Networks and Ubiquitous Computing Systems

 Track III: Security in Real Life Applications

Track III, a new track from this year, focuses on practical 

applications on the real life. 



The submission deadline is May 10, 2010. 

The submission server is ready to welcome your submissions.



--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- 



               IWSEC 2010 Call for Papers



    The 5th International Workshop on Security (IWSEC 2010)



                  November 22-24, 2010

       Kobe International Conference Center, Kobe, Japan

            Web Page: http://www.iwsec.org/2010/

             Contact: [log in to unmask]



            Jointly organized by ISEC and CSEC



[Important Dates]



* Submission of papers (Extended): May 10, 2010 JST (UTC + 9hr)

* Notification to authors: July 14, 2010 JST (UTC + 9hr) 



[Overview]



 IWSEC 2010 will select submissions from three tracks, and 

the review and selection processes of these tracks will be 

independent of each other. Track III (security in real life 

applications) is a new track designed to allow researchers 

and practitioners to share their research and experience. 

We welcome papers that highlight the practical aspects of 

security technologies and industrial case studies.



 Topics of interest for the conference include but are 

not limited to:



 Track I: Foundations of Security]

 (Track Chair: Noboru Kunihiro, The University of Tokyo, Japan)



* Authentication

* Biometrics

* Block/Stream Ciphers

* Cryptographic Protocols

* Cryptanalysis

* Digital Signatures

* Hash Functions

* Information Hiding

* Public Key Cryptosystems

* Quantum Security



 Track II: Security in Networks and Ubiquitous Computing Systems

 (Track Chair: Isao Echizen, National Institute of Informatics, Japan)



* Network Security

 - Intrusion Detection

 - Malware Detection

 - Security in Sensor Networks

* Security of Ubiquitous and Cloud Computing

 - Security of Multi-party Computing

 - Authorization and Access Control

 - Mobile Security

* Privacy Enhancing Technology

 - Anonymity-related Technology

 - Privacy Preserving System

 - Privacy on WEB and DB

* Software Security

 - Security Architectures

 - Data and System Integrity 

 - Reliable Secure Interactions of Services 



 Track III: Security in Real Life Applications

 (Track Chair: Ryoichi Sasaki, Tokyo Denki University, Japan)



* Secure Living and Working Environments

 - Secure Consumer Electronics

 - RFID Security

* Security in Commerce and Government

 - DRM, Copyright Protection, and 

   Content Security E-business/e-commerce/e-government Security

* Security Management

 - Access Control Policies and ISMS

 - Business Processes Security

* Protection of Critical Infrastructures

 - Critical Infrastructure Protection

 - Risk Analysis and Risk Management

* Testing, Verification and Certification

 - Security Verification

 - Assurance

* Law, Policy, Ethics and Related Technologies

 - Digital Forensics

 - Information Law and Ethics



[Instructions for Authors]



 Submitted papers must be original, unpublished, and 

not submitted to other conferences or journals for 

consideration for publication. Papers must be written 

in English and be fully anonymous with no author names, 

affiliations, acknowledgements, or obvious references. 

They should be at most 16 pages long in total, in 

standard LNCS format except for author names and 

affiliations. Papers should be sufficiently intelligible 

and self-contained without appendices so that PC members 

can review papers without them. 



 Accepted full papers will be presented at the workshop 

and will be published in the LNCS conference proceedings 

series. Papers accepted as short papers will also be

presented at the workshop and will be published in the 

locally printed proceedings with an official ISBN number. 

At least one author of each accepted paper is required 

to register with the workshop and present the paper.



 Each paper can be submitted to one of the three tracks. 

The review and selection processes will be done according 

to the policy of the track. For instance, Track III emphasizes 

the practicability of the technology. 



[Best Paper Awards]



 Prizes will be awarded to the authors of the best paper(s) 

and the best student paper(s).



[Committees]



General Chairs:

 Hiroaki Kikuchi (Tokai University, Japan)

 Toru Fujiwara (Osaka University, Japan)



Program Chairs:

 Isao Echizen (National Institute of Informatics, Japan)

 Noboru Kunihiro (The University of Tokyo, Japan)

 Ryoichi Sasaki (Tokyo Denki University, Japan)



Program Committee:



Track I: Foundations of Security

(Track Chair: Noboru Kunihiro, The University of Tokyo, Japan)



 Zhenfu Cao, Shanghai Jiao Tong University, China

 Eiichiro Fujisaki, NTT, Japan

 Aggelos Kiayias, University of Athens, Greece

 Tetsu Iwata, Nagoya University, Japan

 Alfred Menezes, University of Waterloo, Canada

 Phong Nguyen, INRIA and ENS, France

 Kazuo Ohta, The University of Electro-Communications, Japan

 Raphael Phan, Loughborough University, UK

 Bart Preneel, Katholieke Universiteit Leuven, Belgium

 Christian Rechberger, Katholieke Universiteit Leuven, Belgium

 Rei Safavi-Naini, University of Calgary, Canada

 Palash Sarkar, Indian Statistical Institute, India

 Willy Susilo, University of Wollongong, Australia

 Tsuyoshi Takagi, Future University of Hakodate, Japan

 Routo Terada, University of Sao Paulo, Brasil

 Sung-Ming Yen, National Central University, Taiwan

 Yuliang Zheng, University of North Carolina, USA



Track II: Security in Networks and Ubiquitous Computing Systems

(Track Chair: Isao Echizen, National Institute of Informatics, Japan)



 Liqun Chen, HP Laboratories, UK

 Bart De Decker, K.U.Leuven, Belgium

 William Enck, Pennsylvania State University, USA

 Dieter Gollmann, Hamburg University of Technology, Germany

 Yoshiaki Hori, Kyushu University, Japan

 Angelos D. Keromytis, Columbia University, USA

 Seungjoo Kim, Sungkyunkwan University, Korea

 Kwok-Yan Lam, Tsinghua University, China

 Joseph Liu, Institute for Infocomm Research, Singapore

 Javier Lopez, University of Malaga, Spain

 Kyung-Hyune Rhee, Pukyong National University, Korea

 Ahamd-Reza Sadeghi, Ruhr-Universitat Bochum, Germany

 Keisuke Takemori, KDDI Corporation, Japan

 Sven Wohlgemuth, National Institute of Informatics, Japan

 Toshihiro Yamauchi, Okayama University, Japan

 Hiroshi Yoshiura, University of Electro-Communications, Japan

 Alf Zugenmaier, DOCOMO Euro-Labs, Germany



Track III: Security in Real Life Applications

(Track Chair: Ryoichi Sasaki, Tokyo Denki University, Japan)



 Rafael Accorsi, University of Freiburg, Germany

 Claudio Ardagna, Universita degli Studi di Milano, Italy

 Kevin Butler, Pennsylvania State University, USA

 Pau-Chen Cheng, IBM Thomas J Watson Research Center, USA

 Steven Furnell, University of Plymouth, UK

 Jongsung Kim, Kyungnam Universtiy, Korea

 Tetsutaro Kobayashi, NTT, Japan

 Jigang Liu, Metropolitan State University, USA

 Masakatsu Nishigaki, Shizuoka University, Japan

 Hartmut Pohl, University of Applied Sciences Bonn-Rhein-Sieg, Germany

 Kai Rannenberg´╝îGoethe University Frankfurt, Germany

 Sujeet Shenoi, University of Tulsa, USA

 Reima Suomi, Turku School of Economics, Finland

 Mikiya Tani, NEC, Japan

 Ryuya Uda, Tokyo University of Technology, Japan

 Sabrina De Capitani di Vimercati, University of Milan, Italy

 Guilin Wang, University of Birmingham, UK



(Last Update: April 30, 2010)

--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- 



---- 

Dr. Sven Wohlgemuth



National Institute of Informatics (NII)	

2-1-2 Hitotsubashi, Chiyoda-ku		

Tokyo 101-8430						

Japan		

						

Phone	+81 3 4212 2594

Fax		+81 3 3556 1916 (c/o Prof. Dr. Isao Echizen)

WWW 	http://www.nii.ac.jp

		http://research.nii.ac.jp/~iechizen/official/content_e_sven.html

----



    ---------------------------------------------------------------

                To unsubscribe, send an empty email to

     mailto:[log in to unmask]

    For further details of CHI lists see http://sigchi.org/listserv

    ---------------------------------------------------------------


ATOM RSS1 RSS2