Conferences related to Information Security

Back to Top

2014 IEEE Information Theory Workshop (ITW)

ITW2014 is a forum for technical exchange among scientists and engineers working on the fundamentals of information theory. The agenda is broad and will cover the diverse topics that information theory presently impacts. There will be both invited and contributed sessions.

  • 2012 IEEE Information Theory Workshop (ITW 2012)

    The past decade has seen an exponential increase in the data stored in distributed locations in various forms including corporate & personal data, multimedia, and medical data in repositories. The grand challenge is to store, process and transfer this massive amount of data, efficiently and securely over heterogeneous communication networks.

  • 2010 IEEE Information Theory Workshop (ITW 2010)

    Algebraic Methods in Communications Technology

  • 2009 IEEE Information Theory Workshop (ITW 2009)

    Covers the most relevant topics in Information Theory and Coding Theory of interest to the most recent applications to wireless networks, sensor networks, and biology

  • 2008 IEEE Information Theory Workshop (ITW 2008)

    This workshop will take a brief look into the recent information theory past to commemorate the 60th anniversary of Shannon's landmark paper, and then proceed to explore opportunities for information theory research in quantum computation, biology, statistics, and computer science.

  • 2006 IEEE Information Theory Workshop (ITW 2006)


2014 IEEE International Symposium on Information Theory (ISIT)

Annual international symposium on processing, transmission, storage, and use of information, as well as theoretical and applied aspects of coding, communications, and communications networks.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 12th Workshop on Information Optics (WIO)

The workshop has been running for 17 years, starting with the Euro-American Workshop on Optical Pattern Recognition in La Rochelle, 1994. It is a small workshop (typically limited to 30-35 talks), with invited participants broadly from the area of information optics and photonics. Always there has been an emphasis on allowing time for interaction, collaboration, and networking in a friendly atmosphere. Participants stay together for lunch and social outings.Well-known researchers in the fields of optical information processing and advanced imaging techniques regularly attend the conference from Europe, USA, Japan, and Korea, and find it a refreshing, relaxed, and very profitable meeting. Previous workshop locations include Barcelona (1997), Colmar (1999), Valencia (2001), Toledo (2006), Reykjavik (2007), Annecy (2008), Paris (2009), Helsinki (2010), Benicasim (2011) and Quebec (2012).

  • 2012 11th Euro-American Workshop on Information Optics (WIO)

    The workshop will address the latest advances in information optics, information photonics, imaging sciences and engineering, display technologies and 3D displays, 3D image sensing, image-based information security, image recognition, biophotonics, and novel image sensors. It will be a forum for scientific interaction and collaboration between well-known scientists in the field and educational outreach to student.

  • 2011 10th Euro-American Workshop on Information Optics (WIO)

    Fundamental advances in information optics and photonics, including algorithms, devices, and systems. 3D image sensing, processing, and display. Digital holography. Integral imaging. Biophotonics and biomedical imaging. Inverse problems in optics. Image-based security and optical security systems. Polarimetric and multi spectral imaging. Materials and devices for information optics.

  • 2010 9th Euro-American Workshop on Information Optics (WIO)

    information optics, information photonics, imaging sciences and engineering, display technologies and 3D displays, 3D image sensing, image-based information security, image recognition, biophotonics, and novel image sensors


2013 13th Canadian Workshop on Information Theory (CWIT)

The 13th Canadian Workshop on Information Theory will take place in Toronto, Ontario, Canada from Tuesday, May 28, to Friday, May 31, 2013. Previously unpublished contributions from a broad range of topics in information theory and its applications are solicited, including (but not limited to) the following areas: Coded modulation, Coding theory and practice, Communication complexity, Communication systems, Cryptology and data security, Data compression, Detection and estimation, Information theory and statistics, Network coding, Interactive information theory, Pattern recognition and learning, Quantum information processing, Shannon theory, Signal processing, Cognitive radio, Cooperative communication, Multi-terminal information theory, and Information theory in biology. International researchers are welcome to attend and present research at this event.

  • 2011 12th Canadian Workshop on Information Theory (CWIT)

    Applications and practice of information theory

  • 2009 11th Canadian Workshop on Information Theory (CWIT)

    This workshop provides an opportunity for researchers in Information Theory to meet and discuss aspects of their work.

  • 2007 10th Canadian Workshop on Information Theory (CWIT)


More Conferences

Periodicals related to Information Security

Back to Top

Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Industrial Informatics, IEEE Transactions on

IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


More Periodicals

Most published Xplore authors for Information Security

Back to Top

Xplore Articles related to Information Security

Back to Top

Identification of IT security-relevant system characteristics

A. Hunstad; J. Hallberg; A. Stjerneby IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

Information systems are continually integrated into increasingly wide-ranging distributed information systems. These systems are becoming difficult to comprehend and the design, implementation, operation, and maintenance are far from straightforward. To facilitate improved analysis and design methods for these systems, the security-level of systems need to be assessed with a greater precision than currently possible. For this purpose, a set of ...


Using Cluster and Correlation to Construct Attack Scenarios

Yugang Zhang; Shisong Xiao; Xin Zhuang; Xi Peng 2008 International Conference on Cyberworlds, 2008

Nowadays, it becomes more and more important to construct high-level attack scenarios from low-level intrusion alerts reported by intrusion detection systems (IDSs). Some methods have been presented to resolve this problem. These methods have different strengths. However, they also have different limitations. In order to build complicated attack processes accurately, this paper uses cluster and correlation techniques to construct high-level ...


An Age-Based Membership Protocol against Strong Churn in Unstructured P2P Networks

Haowen Liu; Xiwen Liu; Wei Song; Weidong Wen 2011 International Conference on Network Computing and Information Security, 2011

Churn refers the continuous process of node arrival and departure in distributed peer-to-peer network. Enormous nodes joining the system concurrently will results in a flash crowd scenario for special nodes in the system, and enormous nodes crashing in a moment might come out a broken network. In fact, the joining and crashing always occur around some nodes at the same ...


An undergraduate information assurance curriculum

C. W. Reynolds IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

Recognizing that most information assurance education programs are intended for professional graduate students, we investigate whether a curriculum can be designed for undergraduates who desire entry level positions in information assurance. We find that this task must be constrained before it can be solved and so, for that reason, will specify four requirements that our undergraduate curriculum will satisfy. We ...


Design of advanced encryption standard on soft-core processor

Amruta R. Dumane; N. G. Narole; Prashant Wanjari 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), 2016

With the rapid progression of data exchange in electronic world, information security is becoming more important in data transmission and storage. Security became an essential thing during the transmission of confidential information. Cryptographic algorithm is used to scramble the text from one form to another form. This Paper represents the design of Advanced Encryption Standard on soft-core processor. AES is ...


More Xplore Articles

Educational Resources on Information Security

Back to Top

eLearning

Identification of IT security-relevant system characteristics

A. Hunstad; J. Hallberg; A. Stjerneby IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

Information systems are continually integrated into increasingly wide-ranging distributed information systems. These systems are becoming difficult to comprehend and the design, implementation, operation, and maintenance are far from straightforward. To facilitate improved analysis and design methods for these systems, the security-level of systems need to be assessed with a greater precision than currently possible. For this purpose, a set of ...


Using Cluster and Correlation to Construct Attack Scenarios

Yugang Zhang; Shisong Xiao; Xin Zhuang; Xi Peng 2008 International Conference on Cyberworlds, 2008

Nowadays, it becomes more and more important to construct high-level attack scenarios from low-level intrusion alerts reported by intrusion detection systems (IDSs). Some methods have been presented to resolve this problem. These methods have different strengths. However, they also have different limitations. In order to build complicated attack processes accurately, this paper uses cluster and correlation techniques to construct high-level ...


An Age-Based Membership Protocol against Strong Churn in Unstructured P2P Networks

Haowen Liu; Xiwen Liu; Wei Song; Weidong Wen 2011 International Conference on Network Computing and Information Security, 2011

Churn refers the continuous process of node arrival and departure in distributed peer-to-peer network. Enormous nodes joining the system concurrently will results in a flash crowd scenario for special nodes in the system, and enormous nodes crashing in a moment might come out a broken network. In fact, the joining and crashing always occur around some nodes at the same ...


An undergraduate information assurance curriculum

C. W. Reynolds IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

Recognizing that most information assurance education programs are intended for professional graduate students, we investigate whether a curriculum can be designed for undergraduates who desire entry level positions in information assurance. We find that this task must be constrained before it can be solved and so, for that reason, will specify four requirements that our undergraduate curriculum will satisfy. We ...


Design of advanced encryption standard on soft-core processor

Amruta R. Dumane; N. G. Narole; Prashant Wanjari 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), 2016

With the rapid progression of data exchange in electronic world, information security is becoming more important in data transmission and storage. Security became an essential thing during the transmission of confidential information. Cryptographic algorithm is used to scramble the text from one form to another form. This Paper represents the design of Advanced Encryption Standard on soft-core processor. AES is ...


More eLearning Resources

IEEE-USA E-Books

  • Security Systems Engineering

    This chapter contains sections titled: Security Policy Development Senior Management Oversight and Involvement Security Process Management and Standards Information Security Systems Engineering Methodology Requirements Analysis and Decomposition Access Control Concepts Security Modeling and Security-Related Standards Chapter Summary Questions Exercises

  • Traditional Network Concepts

    This chapter contains sections titled: Networking Architectures Types of Networks Network Protocols Chapter Summary Further Reading and Resources Questions Exercises

  • No title

    This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single- database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.

  • Next-Generation Networks

    This chapter contains sections titled: Framework and Topology of the NGN The NGN Functional Reference Model Relationship between NGN Transport and Service Domains Enterprise Role Model Security Allocation within the NGN Transport Stratum Example Converged Network Management (TMN and eTOM) General Network Security Architectures Chapter Summary Further Reading and Resources Exercises

  • No title

    Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering rep esentative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols

  • WHAT IS SECURITY?

    The central role of computer security for the working of the economy, the defense of the country, and the protection of the individual privacy is universally acknowledged today. Secure information systems must work reliably despite random errors, disturbances, and malicious attacks. This chapter examines a number of general ways of discussing security, including the common body of knowledge (CBK), by-function, and then systems engineering approaches. CBK is the critical body of knowledge that serves as a framework of security concepts, definitions, and principles that foster understanding of best practices among those engaged in activities related to information assurance/security. Confidentiality, integrity, and availability (CIA) are the core tenets of information security and are widespread over all the domains of the CBK. The chapter considers the many general security concepts and complexities associated with issues of safety, and information availability, and enterprise infrastructures. It also discusses some basic perspectives on information security.

  • Notes and References

    Bridging the gap between information security and strategic planningThis publication is a reflection of the author's firsthand experience as an information security consultant, working for an array of clients in the private and public sectors. Readers discover how to work with their organizations to develop and implement a successful information security plan by improving management practices and by establishing information security as an integral part of overall strategic planning.The book starts with an overview of basic concepts in strategic planning, information technology strategy, and information security strategy. A practical guide to defining an information security strategy is then provided, covering the "nuts and bolts" of defining long-term information security goals that effectively protect information resources. Separate chapters covering technology strategy and management strategy clearly demonstrate that both are essential, complementary elements in protecting information.Following this practical introduction to strategy development, subsequent chapters cover the theoretical foundation of an information security strategy, including: Examination of key enterprise planning models that correspond to different uses of information and different strategies for securing information Review of information economics, an essential link between information security strategy and business strategy Role of risk in building an information security strategyTwo separate case studies are developed, helping readers understand how the development and implementation of information security strategies can work within their own organizations.This is essential reading for information security managers, information technology executives, and consultants. By linking in formation security to general management strategy, the publication is also recommended for nontechnical executives who need to protect the value and security of their organization's information.

  • General Computer Security Architecture

    This chapter contains sections titled: The Hardware Protects the Software The Software Protects Information Element Security Architecture Description Operating System (OS) Structure Security Mechanisms for Deployed Operating Systems (OSs) Chapter Summary Further Reading and Resources Questions Exercises

  • TRADITIONAL NETWORK CONCEPTS

    This chapter focuses on the concepts and technologies currently found in major networks. It begins with the architectural basis of these networks, moves on to how these networks are structured (deployed), and reviews the protocols used within these networks. The primary network architectures are the International Standards Organization (ISO) open systems interconnection model (OSI) and the internet model. There are a number of physical and logical structures that modern networks rely on, including local area networks (LAN), Wireless LAN (WLAN), metropolitan area networks (MAN), wide area networks (WAN), and internet. The chapter examines the general concepts of protocol layering and interfaces. Three primary transport protocols used in the internet protocol stack are transmission control protocol (TCP), unreliable datagram protocol (UDP) and stream control transmission protocol (SCTP). The chapter considers the capabilities and security mechanisms available for use with simple network management protocol (SNMP) and TR-69.

  • About the Author

    No abstract.



Standards related to Information Security

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards

Jobs related to Information Security

Back to Top