Conferences related to Authenticity

Back to Top

2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU


2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)

IWCMC 2018 will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to wireless networks, wireless sensors, vehicular communications, and mobile computing.


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 17th International Conference on Information Technology Based Higher Education and Training (ITHET)

The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs. ITHET 2018 will continue with the traditional themes of previous events. However, our special theme for this year is a fundamental one. We have previously had MOOCs as our special theme, but now they are just infrastructure. Even “Blended Learning” is what we all do anyway. In a time of the unprecedented access to knowledge through IT, it is time for us to revisit the fundamental purpose of our educational system. It is certainly not about knowledge anymore.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


More Conferences

Periodicals related to Authenticity

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Control Systems Technology, IEEE Transactions on

Serves as a compendium for papers on the technological advances in control engineering and as an archival publication which will bridge the gap between theory and practice. Papers will highlight the latest knowledge, exploratory developments, and practical applications in all aspects of the technology needed to implement control systems from analysis and design through simulation and hardware.


More Periodicals

Most published Xplore authors for Authenticity

Back to Top

Xplore Articles related to Authenticity

Back to Top

Affirming Hardware Design Authenticity Using Fragile IP Watermarking

[{u'author_order': 1, u'affiliation': u'German University in Cairo, Faculty of Information and Engineering Technology, Cairo, Egypt', u'full_name': u'Samar M. Hussein Shukry'}, {u'author_order': 2, u'affiliation': u'German University in Cairo, Faculty of Information and Engineering Technology, Cairo, Egypt', u'full_name': u'Amr T. Abdel-Hamid'}, {u'author_order': 3, u'affiliation': u'Ain-Shams University, Electronics and Communications Engineering Department, Cairo, Egypt', u'full_name': u'Mohamed Dessouky'}] 2018 International Conference on Computer and Applications (ICCA), None

The increasing cost of IC fabrication and the ever-shrinking transistor size forces IC Industry to move its fabrication facilities to cheaper less reliable sources. This process creates the chance of inserting malicious manipulations namely Hardware Trojans at different phases of the design cycle. Trojans are a real challenge to IC industry especially in an era of smart cities and connected ...


Research on Key Technique of Screen Spot Authenticity Detection Based on ARPA Ground- Based Radar

[{u'author_order': 1, u'affiliation': u'China Transport Telecommunications & Information Center, Beijing, 101601, China', u'full_name': u'Dai Ming'}, {u'author_order': 2, u'affiliation': u'China Transport Telecommunications & Information Center, Beijing, 101601, China', u'full_name': u'Qian Shao'}] 2017 International Conference on Computer Systems, Electronics and Control (ICCSEC), None

In this paper, the target information is obtained from the original radar image based on the ER rule, that is, the ship target recognition is needed for the spot in the radar image. In practice, it is necessary to discriminate the authenticity of the target from the difference feature of the radar spot in the continuous image. Through the E-R ...


Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems

[{u'author_order': 1, u'affiliation': u'Politecnico di Torino, Control and Computing Engineering Department', u'full_name': u'Alberto Carelli'}, {u'author_order': 2, u'affiliation': u'Politecnico di Torino, Control and Computing Engineering Department', u'full_name': u'Carlo Alberto Cristofanini'}, {u'author_order': 3, u'affiliation': u'Politecnico di Torino, Control and Computing Engineering Department', u'full_name': u'Alessandro Vallero'}, {u'author_order': 4, u'affiliation': u'Politecnico di Torino, Control and Computing Engineering Department', u'full_name': u'Cataldo Basile'}, {u'author_order': 5, u'affiliation': u'Politecnico di Torino, Control and Computing Engineering Department', u'full_name': u'Paolo Prinetto'}, {u'author_order': 6, u'affiliation': u'Politecnico di Torino, Control and Computing Engineering Department', u'full_name': u'Stefano Di Carlo'}] 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), None

The mobile application market is rapidly growing and changing, offering always brand new software to install in increasingly powerful devices. Mobile devices become pervasive and more heterogeneous, embedding latest technologies such as multicore architectures, special-purpose circuits and reconfigurable logic. In a future mobile market scenario where reconfigurable systems are employed, new security concerns are introduced. In particular, protecting the Intellectual ...


DAMON: A Data Authenticity Monitoring System for Diabetes Management

[{u'author_order': 1, u'affiliation': u'Sch. of Eng. & Appl. Sci., Univ. of Virginia, Charlottesville, VA, USA', u'full_name': u'William Young'}, {u'author_order': 2, u'affiliation': u'Sch. of Eng. & Appl. Sci., Univ. of Virginia, Charlottesville, VA, USA', u'full_name': u'John Corbett'}, {u'author_order': 3, u'affiliation': u'Sch. of Eng. & Appl. Sci., Univ. of Virginia, Charlottesville, VA, USA', u'full_name': u'Matthew S. Gerber'}, {u'author_order': 4, u'affiliation': u'Sch. of Eng. & Appl. Sci., Univ. of Virginia, Charlottesville, VA, USA', u'full_name': u'Stephen Patek'}, {u'author_order': 5, u'affiliation': u'Sch. of Eng. & Appl. Sci., Univ. of Virginia, Charlottesville, VA, USA', u'full_name': u'Lu Feng'}] 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), None

We present DAMON, a data authenticity monitoring system for use in an Internet of Medical Things (IoMT) system assembled to treat Type 1 Diabetes (T1D). We describe the use of Signal Temporal Logic (STL) for specifying and monitoring a range of system properties relevant to T1D treatment, including constraints on glycemic variability and insulin delivery. We perform retrospective analysis of ...


Real vs. Fake Emotion Challenge: Learning to Rank Authenticity from Facial Activity Descriptors

[{u'author_order': 1, u'affiliation': u'Otto von Guericke Univ., Magdeburg, Germany', u'full_name': u'Frerk Saxen'}, {u'author_order': 2, u'affiliation': u'Otto von Guericke Univ., Magdeburg, Germany', u'full_name': u'Philipp Werner'}, {u'author_order': 3, u'affiliation': u'Otto von Guericke Univ., Magdeburg, Germany', u'full_name': u'Ayoub Al-Hamadi'}] 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), None

Distinguishing real from fake expressions is an emergent research topic. We propose a new method to rank authenticity of multiple videos from facial activity descriptors, which won the ChaLearn real vs. fake emotion challenge. Two studies with 22 human observers show that our method outperforms humans by a large margin. Further, it shows that our proposed ranking method is superior ...


More Xplore Articles

Educational Resources on Authenticity

Back to Top

eLearning

No eLearning Articles are currently tagged "Authenticity"

IEEE-USA E-Books

  • Authenticity Beats Eloquence

    Most experts stress the need for practice before making a presentation, but this chapter provides an anecdote illustrating the possible dangers of overpreparing and studied eloquence and losing on authenticity. Rehearsing before making a presentation probably does the most good for the most people. A quick flip through the slides just before the talk is fine, but frantic last-minute cramming will just get the presenter even more keyed up without really helping. This chapter suggests that if a person is not quite ready to face the audience, the bathroom mirror is always handy. After talking to the mirror, the person should relax. The chapter also suggests the following points for making the presentation: speaking up, standing tall, avoiding rhetoric, engaging audience, and staying in charge. The three rules of public speaking are being forthright; being brief; and being seated.

  • Native Stagings: Pirate Acts and the Complex of Authenticity

    This chapter contains sections titled: Staging the Native, Exclusive Indigeneity, Export Redemption, Authenticity's Complex, On Innovation and Adulteration, Augmenting Experience, Authentic Mutations

  • Network Security and Privacy for Cyber‐Physical Systems

    Cyber‐physical systems (CPSs) are expected to collect, process, and exchange data that regularly contain sensitive information. CPSs may, for example, involve a person in the privacy of her home or convey business secrets in production plants. Hence, confidentiality, integrity, and authenticity are of utmost importance for secure and privacy‐preserving CPSs. In this chapter, we present and discuss emerging security and privacy issues in CPSs and highlight challenges as well as opportunities for building and operating these systems in a secure and privacy‐preserving manner. We focus on issues that are unique to CPSs, for example, resulting from the resource constraints of the involved devices and networks, the limited configurability of these devices, and the expected ubiquity of the data collection of CPSs. The covered issues impact the security and privacy of CPSs from local networks to Cloud‐based environments.

  • The CD-ROM That Would Not Be

    On July 3, 2015, the Internet awoke to a weird story. Someone had recovered a long-lost prototype of the "Super NES CD-ROM." Pictures were posted, news sites reported all kinds of things, and authenticity was discussed, questioned, proved, and disproved, all at the same time.

  • Forensic Authentication of Digital Audio and Video Files

    Requests of a forensic laboratory to conduct authenticity examinations of digital audio and video files are usually based on one or more of the following reasons: legal, investigative or administrative. This chapter discusses the types of common recording devices, digital file formats and evidence requirements. Next, it talks about the physical laboratory facility, and requisite software and equipment. The chapter explains the protocols for conducting scientific authenticity examinations of digital audio and video files, including critical listening and visual reviews, data analysis and temporal/frequency analyses. The protocol used when conducting forensic authenticity examinations of digital audio and video files is based on a number of different analysis steps, as applicable, which are generally categorized as follows: hashing and cloning; playback and conversion optimization; digital data analysis; audio analyses; video analyses; and preparation of work notes. The chapter also talks about the importance of expert testimony, and provides some case examples.

  • Image and Video Processing History Recovery

    This chapter describes the most useful traces used for image and video processing history recovery, and the main forensic techniques that are based on them. The important traces are those relying on specific properties of the encoding process. However, coding artifacts are rarely the only trace of processing. Editing operations, like resizing and colour enhancement, are commonly applied to both images and video. First, the chapter introduces the existing approaches used in the forensic literature to reveal the presence of coding and editing artifacts. Then, it explains how to employ such tools to recover several parameters characterizing the processing history. The chapter presents two case studies, showing possible applications of processing history recovery to tamper detection. It shows how the illustrated forensic techniques can be applied in realistic settings to partly recover the processing history, and how this information can provide useful hints about the authenticity of the analysed media.

  • Query Answer Authentication

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

  • A Survey of Information AuthenticationThis work was performed at Sandia National Laboratories and supported by the u.s. Department of Energy under contract no. DEAC0476DP00789.

    In both commercial and private transactions, authentication of information (messages) is of vital concern to all of the participants. For example, the party accepting a check usually insists on corroborating identification of the issuer¿¿-¿¿authentication of the originator, or as we shall say throughout this chapter, the transmitter¿¿-¿¿and the party issuing the check not only fils in the face amount in numerals, but also writes out the amount in script, and may even go so far as to emboss that part of the check to make it more difficult for anyone to subsequently alter the face amount appearing on an instrument bearing his valid signature, that is, a primitive means of providing for the later authentication of the communication or message. Although this example illustrates the two main concerns of the participants in the authentication of information, namely, the verification that the communication was originated by the purported transmitter and that it hasn't subsequently been substituted for or altered, it fails to illustrate perhaps the most important feature in the current use of authentication. The information conveyed on the check is inextricably linked to a physical instrument, the check itself, for which there exist legally accepted protocols to establish the authenticity of the signature and the integrity of what the issuer wrote in the event of a later dispute as to whether the check is valid or the signature genuine, independent of the information content (date, amount, etc.) recorded there. The contemporary concern in authentication, though, is with situations in which the exchange involves only information, that is, in which there is no physical instrument that can later be used to corroborate the authenticity of either the transmitter's identity or of the communication.

  • How to Insure That Data Acquired to Verify Treaty Compliance Are TrustworthyThis chapter first appeared in the Proceedings of the IEEE, vol. 76, no. 5, May 1988.

    In a series of papers [6-8] this author has documented the evolution at the Sandia National Laboratories of a solution to the problem of how to make it possible for two mutually distrusting (and presumed deceitful) parties, the host and the monitor, to both trust a data acquisition system whose function it is to inform the monitor, and perhaps third parties, whether the host has or has not violated the terms of a treaty. The even more important question of what data will adequately show compliance (or noncompliance) and of how this data can be gathered in a way that adequately insures against deception will not be discussed here. We start by assuming that such a data acquisition system exists, and that the opportunities for deception that are the subject of this chapter lie only in the manipulation of the data itself, that is, forgery, modification, retransmission, etc. The national interests of the various participants, host, monitor and third parties, at first appear to be mutually exclusive and irreconcilable, however we will arrive at the conclusion that it is possible to simultaneously satisfy the interests of all parties. The technical device on which this resolution depends is the concatenation of two or more private authentication channels to create a system in which each participant need only trust that part of the whole that he contributed. In the resulting scheme, no part of the data need be kept secret from any participant at any time; no party, nor collusion of fewer than all of the parties can utter an undetectable forgery; no unilateral action on the part of any party can lessen the confidence of the others as to the authenticity of the data and finally third parties, that is, arbiters, can be logically persuaded of the authenticity of data. Thus, finally after nearly two decades of development a complete technical solution is in hand for the problem of trustworthy verification of treaty compliance.

  • Network Security and Attack Defense

    This chapter contains sections titled: * Introduction * Confidentiality * Integrity * Authenticity * Nonrepudiation * Freshness * Availability * Intrusion Detection * Key Management * Summary * Acknowledgments * References



Standards related to Authenticity

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...