E-mail List Archives

Call for Submissions: ICITST-2017 || December 11-14, 2017, University of Cambridge, UK

for

From: D. Lin, ICITST-2017
Date: Aug 28, 2017 8:07AM


<!DOCTYPE html>
<html><head>
<meta charset=3D"UTF-8">
</head><body><p>Kindly email this Call for Submissions to your colleagues, =
faculty members and postgraduate students.<br></p><p><br>CALL FOR SUBMISSIO=
NS!<br><br>************************************************************<br>=
The 12th International Conference for Internet Technology and Secured Trans=
actions (ICITST-2017) <br>Technical Co-Sponsored by IEEE UK/IE Computer Cha=
pter<br>Venue: University of Cambridge<br>December 11-14, 2017<br>www.icits=
t.org<br>************************************************************&#160;=
&#160;&#160;&#160;&#160;&#160; &#160;<br><br>The ICITST is an international=
refereed conference dedicated to the advancement of the theory and practic=
al implementation of secured Internet transactions and to fostering discuss=
ions on information technology evolution. The ICITST aims to provide a high=
ly professional and comparative academic research forum that promotes colla=
borative excellence between academia and industry. <br>&#160;&#160;&#160;&#=
160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160=
;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#=
160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160=
;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#=
160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160=
;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#=
160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160=
;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#=
160;&#160;&#160;&#160;&#160; &#160;<br>The topics in ICITST-2017 include bu=
t are not confined to the following areas:<br>&#160;<br>Internet Applicatio=
ns and Technology:<br>* Internet Architecture<br>* Internet of things<br>* =
Broadband Access Technologies<br>* Application Agents<br>* Boundary Issues =
of Internet Security<br>* Database Management<br>* Data Models for Producti=
on Systems and Services<br>* Artificial Intelligence and Expert Systems<br>=
* IPSec Quality of Service<br>* Knowledge Management<br>* Embedded Systems<=
br>* Defence Systems<br><br>Ubi/Cloud Computing:<br>* Authentication and Ac=
cess Control for Data Protection in Ubi/Cloud Computing<br>* Context-Awaren=
ess and its Data Mining for UbiCom<br>* Data Grids<br>* Distributed Informa=
tion Systems<br>* Human-Computer Interface and Interaction for UbiCom<br>* =
Ubiquitous Systems<br>* USN/RFID Service<br>* Smart Homes and its Business =
Model for UbiCom Service<br>* Security and its Data Management for UbiCom<b=
r>* Peer to Peer Data Management<br>* New Novel Mechanism and Application f=
or Ubi/Cloud Computing<br><br>Information Security:<br>* Trust, Privacy and=
Data Security<br>* Network Security Issues and Protocols<br>* Security Cha=
llenges and Content Authoring<br>* Cryptography<br>* Secure Communications<=
br>* Authentication Techniques<br>* Chaos-based Data Security<br>* MANET Se=
curity <br>* Wireless Sensor Network Security<br>* Organization Considerati=
ons in Security Policy Formulation and Implementations<br>* Digital Forensi=
cs and Crimes<br>* Biometrics<br>* Cyber Security<br><br>Multimedia and Web=
Services:<br>* Intelligent Multimedia and its Data Management<br>* Multime=
dia Information Systems<br>* Multimedia Security<br>* Web Databases<br>* We=
b Metrics and its Applications<br>* Web Mining including Web Intelligence a=
nd Web 3.0.<br>* Web Services<br>* XML and other extensible languages<br>* =
Semantic Web and Ontology<br><br>Infonomics and e-Technology:<br>* Infonomi=
cs<br>* Information Visualization<br>* Information Management<br>* Informat=
ion Quality<br>* Technology-Enabled Information<br>* e-Learning<br>* e-Comm=
erce<br>* e-Business<br>* e-Government<br>* e-Society<br>* System Design an=
d Security for e-Services<br>* Synchronizing e-Security<br><br>Submissions:=
<br>&#160;<br>*You can submit your extended abstract or paper online at htt=
p://icitst.org/paper-submission/ or<br>email it to extendedabstract@icitst.=
org or <EMAIL REMOVED> <br>*You can submit your poster via email at poster=
<EMAIL REMOVED> <br>*You can submit your workshop or tutorial proposal via emai=
l at <EMAIL REMOVED> <br><br>Submission Dates:<br><br>*Extended=
Abstract (Work in Progress) Submission Date: September 15, 2017<br>*Notifi=
cation of Extended Abstract Acceptance/Rejection: September 25, 2017<br>*Fu=
ll Paper Submission Date: September 30, 2017<br>*Notification of Paper Acce=
ptance/Rejection: October 15, 2017<br>*Camera Ready Paper Due: November 15,=
2017<br>*Workshops and Tutorials Submission Date: September 01, 2017<br>*N=
otification of Workshop and Tutorial Acceptance: September 05, 2017<br>*Spe=
cial Track Submission Date: September 01, 2017<br>*Notification of Special =
Track Acceptance: September 05, 2017<br>*Poster/Demo Submission Date: Septe=
mber 30, 2017<br>*Notification of Poster/Demo Acceptance: October 15, 2017<=
br>*Proposal for Industrial Presentation: September 01, 2017<br>*Notificati=
on of Industrial Presentation Acceptance: September 05, 2017<br>*Early Regi=
stration Deadline: October 30, 2017<br>*Late Registration Deadline (Authors=
only): November 15, 2017<br>*Late Registration (Participants only): Novemb=
er 25, 2017<br>*Conference Dates: December 11-14, 2017<br><br><br>For more =
details, please contact <a href=3D"mailto: <EMAIL REMOVED> "> <EMAIL REMOVED> <=
/a> <br><br>YouTube <a href=3D"https://youtu.be/XyMK-_nZiIQ">https://youtu.=
be/XyMK-_nZiIQ</a> <br></p></body></html>
=20