Conferences related to Authenticity

Back to Top

2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU


2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)

IWCMC 2018 will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to wireless networks, wireless sensors, vehicular communications, and mobile computing.


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 17th International Conference on Information Technology Based Higher Education and Training (ITHET)

The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs. ITHET 2018 will continue with the traditional themes of previous events. However, our special theme for this year is a fundamental one. We have previously had MOOCs as our special theme, but now they are just infrastructure. Even “Blended Learning” is what we all do anyway. In a time of the unprecedented access to knowledge through IT, it is time for us to revisit the fundamental purpose of our educational system. It is certainly not about knowledge anymore.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


More Conferences

Periodicals related to Authenticity

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Control Systems Technology, IEEE Transactions on

Serves as a compendium for papers on the technological advances in control engineering and as an archival publication which will bridge the gap between theory and practice. Papers will highlight the latest knowledge, exploratory developments, and practical applications in all aspects of the technology needed to implement control systems from analysis and design through simulation and hardware.


More Periodicals


Xplore Articles related to Authenticity

Back to Top

The New Verification Method of Authenticity for Pottery and Porcelain Products: Application of the Artifact-Metrics Technology

[{u'author_order': 1, u'full_name': u'Masaki Fujikawa'}, {u'author_order': 2, u'full_name': u'Fumihiko Oda'}, {u'author_order': 3, u'full_name': u'Kengo Moriyasu'}, {u'author_order': 4, u'full_name': u'Shingo Fuchi'}, {u'author_order': 5, u'full_name': u'Yoshikazu Takeda'}] 2013 IEEE 37th Annual Computer Software and Applications Conference, 2013

The authors propose a new method in which the fact that a pottery or porcelain product is actually produced by the brand-holder company or by the ceramic artist (authenticity) can be easily verified, and at the same time, production of counterfeit products becomes difficult. The artifact-metrics are used in this method and as the material used in the method is ...


Blind Identification Method for Authenticity of Infinite Light Source Images

[{u'author_order': 1, u'full_name': u'Haipeng Chen'}, {u'author_order': 2, u'full_name': u'Xuanjing Shen'}, {u'author_order': 3, u'full_name': u'Yingda Lv'}] 2010 Fifth International Conference on Frontier of Computer Science and Technology, 2010

In this paper, a blind identification for authenticity of infinite light source images was proposed. The inconsistency in light source direction resulted from image forgery is used to identify image authenticity. According to the error function of the actual light intensity and calculated light intensity and the constraint function of infinite light source to light beam, Hestenes-Powell multiplier method is ...


Authenticity of digital records in practice

[{u'author_order': 1, u'affiliation': u'School of Library, Archival and Information Studies, University of British Columbia, Vancouver, Canada', u'full_name': u'Corinne Rogers'}] 2015 Digital Heritage, 2015

The ability of citizens to access their government's information fully and in a timely manner is one of the cornerstones of democracy. Citizens' rights and government accountability depend on how information - how records - are created, managed, and preserved. One of the critical aspects of government records is the ability to attest to their authenticity over time and across ...


Object addition, removal and video authenticity testing

[{u'author_order': 1, u'affiliation': u'Department of Computer and Information Science, Gannon University, Erie PA 16541, USA', u'full_name': u'Bassam Almatrafi'}, {u'author_order': 2, u'affiliation': u'Department of Computer and Information Science, Gannon University, Erie PA 16541, USA', u'full_name': u'Sreela Sasi'}] 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016

This research focuses on the process for adding, removing objects from videos and on the video authenticity testing. A new process is developed for adding an object in a video. A Graphical User Interface is designed to demonstrate the addition of object. Seam carving is one of the best existing techniques for object removal from an image. Even though seam ...


Fabric authenticity method using fast Fourier transformation detection

[{u'author_order': 1, u'affiliation': u'Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Kuantan, 26300, Malaysia', u'full_name': u'Norislina Ismail'}, {u'author_order': 2, u'affiliation': u'Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Kuantan, 26300, Malaysia', u'full_name': u'W. Md. Syahrir'}, {u'author_order': 3, u'affiliation': u'Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Kuantan, 26300, Malaysia', u'full_name': u'Jasni M. Zain'}, {u'author_order': 4, u'affiliation': u'Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Kuantan, 26300, Malaysia', u'full_name': u'Hai Tao'}] International Conference on Electrical, Control and Computer Engineering 2011 (InECCE), 2011

The authenticity or originality of sport jersey cloth fabric in market nowadays is difficult to distinguish. This is a critical issue that leads to the difficulty for customer to know whether they are purchase the original fabric or the fake one. The purpose of this paper is to develop a prototype for Fabric Authenticity System to judge the originality of ...


More Xplore Articles

Educational Resources on Authenticity

Back to Top

eLearning

No eLearning Articles are currently tagged "Authenticity"

IEEE-USA E-Books

  • 2 Violence, Propriety, Authenticity: A Symbolic Economy of the Dark Web

    On a Tor-based market forum for customers of a counterfeit American currency vendor, one satisfied customer proclaimed, “I like the sparkly 20 [counterfeit dollar bill] because I do something to them that makes it look legit:) I also make the green eagle look legit. All by hand;).”

  • Authenticity Beats Eloquence

    Most experts stress the need for practice before making a presentation, but this chapter provides an anecdote illustrating the possible dangers of overpreparing and studied eloquence and losing on authenticity. Rehearsing before making a presentation probably does the most good for the most people. A quick flip through the slides just before the talk is fine, but frantic last-minute cramming will just get the presenter even more keyed up without really helping. This chapter suggests that if a person is not quite ready to face the audience, the bathroom mirror is always handy. After talking to the mirror, the person should relax. The chapter also suggests the following points for making the presentation: speaking up, standing tall, avoiding rhetoric, engaging audience, and staying in charge. The three rules of public speaking are being forthright; being brief; and being seated.

  • Native Stagings: Pirate Acts and the Complex of Authenticity

    This chapter contains sections titled: Staging the Native, Exclusive Indigeneity, Export Redemption, Authenticity's Complex, On Innovation and Adulteration, Augmenting Experience, Authentic Mutations

  • 7 Facebook and the Dark Web: A Collision

    <tonious> “I2P: Who needs the IETF?”—From jrandom's collected I2P quotations Facebook's Tor hidden service, found at https://facebookcorewwwi.onion, is lightning in a bottle. It is at the intersection of all three legitimacies analyzed in this book: state delegation of rules and regulations to a standards body (in this case, the Internet Engineering Task Force [IETF]); corporate propriety (DigiCert, Facebook); nonprofit propriety (the Tor Project); hacker legitimacy (the [now disgraced] hacker wunderkind Jacob Appelbaum); and Dark Web authenticity (the notoriety of Silk Road). Thus, Facebook on Tor is an association of state-delegated power, respect of resources, and authenticity. It is also a symbol of the blurred lines between the Dark Web and the Clear Web, a collision of legitimation and delegitimation.

  • The CD-ROM That Would Not Be

    On July 3, 2015, the Internet awoke to a weird story. Someone had recovered a long-lost prototype of the “Super NES CD-ROM.” Pictures were posted, news sites reported all kinds of things, and authenticity was discussed, questioned, proved, and disproved, all at the same time.

  • Query Answer Authentication

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

  • Network Security and Privacy for Cyber‐Physical Systems

    Cyber‐physical systems (CPSs) are expected to collect, process, and exchange data that regularly contain sensitive information. CPSs may, for example, involve a person in the privacy of her home or convey business secrets in production plants. Hence, confidentiality, integrity, and authenticity are of utmost importance for secure and privacy‐preserving CPSs. In this chapter, we present and discuss emerging security and privacy issues in CPSs and highlight challenges as well as opportunities for building and operating these systems in a secure and privacy‐preserving manner. We focus on issues that are unique to CPSs, for example, resulting from the resource constraints of the involved devices and networks, the limited configurability of these devices, and the expected ubiquity of the data collection of CPSs. The covered issues impact the security and privacy of CPSs from local networks to Cloud‐based environments.



Standards related to Authenticity

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...