Conferences related to Information Security

Back to Top

2014 IEEE Information Theory Workshop (ITW)

ITW2014 is a forum for technical exchange among scientists and engineers working on the fundamentals of information theory. The agenda is broad and will cover the diverse topics that information theory presently impacts. There will be both invited and contributed sessions.

  • 2012 IEEE Information Theory Workshop (ITW 2012)

    The past decade has seen an exponential increase in the data stored in distributed locations in various forms including corporate & personal data, multimedia, and medical data in repositories. The grand challenge is to store, process and transfer this massive amount of data, efficiently and securely over heterogeneous communication networks.

  • 2010 IEEE Information Theory Workshop (ITW 2010)

    Algebraic Methods in Communications Technology

  • 2009 IEEE Information Theory Workshop (ITW 2009)

    Covers the most relevant topics in Information Theory and Coding Theory of interest to the most recent applications to wireless networks, sensor networks, and biology

  • 2008 IEEE Information Theory Workshop (ITW 2008)

    This workshop will take a brief look into the recent information theory past to commemorate the 60th anniversary of Shannon's landmark paper, and then proceed to explore opportunities for information theory research in quantum computation, biology, statistics, and computer science.

  • 2006 IEEE Information Theory Workshop (ITW 2006)


2014 IEEE International Symposium on Information Theory (ISIT)

Annual international symposium on processing, transmission, storage, and use of information, as well as theoretical and applied aspects of coding, communications, and communications networks.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 12th Workshop on Information Optics (WIO)

The workshop has been running for 17 years, starting with the Euro-American Workshop on Optical Pattern Recognition in La Rochelle, 1994. It is a small workshop (typically limited to 30-35 talks), with invited participants broadly from the area of information optics and photonics. Always there has been an emphasis on allowing time for interaction, collaboration, and networking in a friendly atmosphere. Participants stay together for lunch and social outings.Well-known researchers in the fields of optical information processing and advanced imaging techniques regularly attend the conference from Europe, USA, Japan, and Korea, and find it a refreshing, relaxed, and very profitable meeting. Previous workshop locations include Barcelona (1997), Colmar (1999), Valencia (2001), Toledo (2006), Reykjavik (2007), Annecy (2008), Paris (2009), Helsinki (2010), Benicasim (2011) and Quebec (2012).

  • 2012 11th Euro-American Workshop on Information Optics (WIO)

    The workshop will address the latest advances in information optics, information photonics, imaging sciences and engineering, display technologies and 3D displays, 3D image sensing, image-based information security, image recognition, biophotonics, and novel image sensors. It will be a forum for scientific interaction and collaboration between well-known scientists in the field and educational outreach to student.

  • 2011 10th Euro-American Workshop on Information Optics (WIO)

    Fundamental advances in information optics and photonics, including algorithms, devices, and systems. 3D image sensing, processing, and display. Digital holography. Integral imaging. Biophotonics and biomedical imaging. Inverse problems in optics. Image-based security and optical security systems. Polarimetric and multi spectral imaging. Materials and devices for information optics.

  • 2010 9th Euro-American Workshop on Information Optics (WIO)

    information optics, information photonics, imaging sciences and engineering, display technologies and 3D displays, 3D image sensing, image-based information security, image recognition, biophotonics, and novel image sensors


2013 13th Canadian Workshop on Information Theory (CWIT)

The 13th Canadian Workshop on Information Theory will take place in Toronto, Ontario, Canada from Tuesday, May 28, to Friday, May 31, 2013. Previously unpublished contributions from a broad range of topics in information theory and its applications are solicited, including (but not limited to) the following areas: Coded modulation, Coding theory and practice, Communication complexity, Communication systems, Cryptology and data security, Data compression, Detection and estimation, Information theory and statistics, Network coding, Interactive information theory, Pattern recognition and learning, Quantum information processing, Shannon theory, Signal processing, Cognitive radio, Cooperative communication, Multi-terminal information theory, and Information theory in biology. International researchers are welcome to attend and present research at this event.

  • 2011 12th Canadian Workshop on Information Theory (CWIT)

    Applications and practice of information theory

  • 2009 11th Canadian Workshop on Information Theory (CWIT)

    This workshop provides an opportunity for researchers in Information Theory to meet and discuss aspects of their work.

  • 2007 10th Canadian Workshop on Information Theory (CWIT)


More Conferences

Periodicals related to Information Security

Back to Top

Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Industrial Informatics, IEEE Transactions on

IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Intelligent Systems, IEEE

IEEE Intelligent Systems, a bimonthly publication of the IEEE Computer Society, provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently. The editorial staff collaborates with authors to produce technically accurate, timely, useful, and readable articles as part of a consistent and consistently valuable editorial product. The magazine serves software engineers, systems ...


More Periodicals

Most published Xplore authors for Information Security

Back to Top

Xplore Articles related to Information Security

Back to Top

Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


Formal Specification and Verification of an Extended Security Policy Model for Database Systems

Zhu Hong; Zhu Yi; Li Chenyang; Shi Jie; Fu Ge; Wang Yuanzhen 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

In order to develop highly secure database systems to meet the requirements for class B2, an extended formal security policy model based on the BLP model is presented in this paper. A method for verifying security model for database systems is proposed. According to this method, the development of a formal specification and verification to ensure the security of the ...


Performance Evaluation of SCTP-Sec: A Secure SCTP Mechanism

Rahul Choudhari; K. V. Arya; Mukesh Tiwari; Kumar Sidharth Choudhary 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

The stream control transmission protocol (SCTP) uses a cookie mechanism to tackle the security and traditional attack scenario. Unfortunately, SCTP is not secured against redirection attacks, bombing attacks and towards verification-tag guessing attacks which lead to association-hijacking and may force the victim client to starve out of service from the server. Therefore, we propose a secure SCTP mechanism that uses ...


Machine learning approaches to power-system security assessment

L. Wehenkel IEEE Expert, 1997

The paper discusses a framework that uses machine learning and other automatic-learning methods to assess power-system security. The framework exploits simulation models in parallel to screen diverse simulation scenarios of a system, yielding a large database. Using data mining techniques, the framework extracts synthetic information about the simulated system's main features from this database


Enriched Trusted Platform and its Application on DRM

Yongdong Wu; Feng Bao 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

The TCG (Trusted Computing Group) is an industry working group which aims to establish industry standards for trust and security in computing platforms. This paper enriches the TCG architecture by adding a SPM (Secure Process Manager) into the trusted platform as a kernel component for the purpose of process management. To attest a process/software to a remote peer, SPM will ...


More Xplore Articles

Educational Resources on Information Security

Back to Top

eLearning

Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


Formal Specification and Verification of an Extended Security Policy Model for Database Systems

Zhu Hong; Zhu Yi; Li Chenyang; Shi Jie; Fu Ge; Wang Yuanzhen 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

In order to develop highly secure database systems to meet the requirements for class B2, an extended formal security policy model based on the BLP model is presented in this paper. A method for verifying security model for database systems is proposed. According to this method, the development of a formal specification and verification to ensure the security of the ...


Performance Evaluation of SCTP-Sec: A Secure SCTP Mechanism

Rahul Choudhari; K. V. Arya; Mukesh Tiwari; Kumar Sidharth Choudhary 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

The stream control transmission protocol (SCTP) uses a cookie mechanism to tackle the security and traditional attack scenario. Unfortunately, SCTP is not secured against redirection attacks, bombing attacks and towards verification-tag guessing attacks which lead to association-hijacking and may force the victim client to starve out of service from the server. Therefore, we propose a secure SCTP mechanism that uses ...


Machine learning approaches to power-system security assessment

L. Wehenkel IEEE Expert, 1997

The paper discusses a framework that uses machine learning and other automatic-learning methods to assess power-system security. The framework exploits simulation models in parallel to screen diverse simulation scenarios of a system, yielding a large database. Using data mining techniques, the framework extracts synthetic information about the simulated system's main features from this database


Enriched Trusted Platform and its Application on DRM

Yongdong Wu; Feng Bao 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

The TCG (Trusted Computing Group) is an industry working group which aims to establish industry standards for trust and security in computing platforms. This paper enriches the TCG architecture by adding a SPM (Secure Process Manager) into the trusted platform as a kernel component for the purpose of process management. To attest a process/software to a remote peer, SPM will ...


More eLearning Resources

IEEE-USA E-Books

  • Developing an Information Security Strategy

    This chapter contains sections titled: Overview An Information Security Strategy Development Methodology Strategy Prerequisites Preliminary Development Formal Project Introduction Fact Finding Analysis Methods Analysis Focus Areas Draft Plan Presentation Final Plan Presentation Options for Plan Development A Plan Outline Selling the Strategy Plan Maintenance The Security Assessment and the Security Strategy Strategy Implementation Key Points Plan Outline

  • Systems Engineering

    This chapter contains sections titled: So What Is Systems Engineering? Process Management Organization Environments Chapter Summary Further Reading and Resources Questions Exercises

  • The Technology Strategy

    This chapter contains sections titled: Thinking About Technology Planning Technology Implementation Technology Forecasting Technology Strategy Components The Security Strategy Technical Architecture Overall Technical Design The Logical Technology Architecture Specific Technical Components Key Points

  • Foundation Concepts

    This chapter contains sections titled: Security Concepts and Goals Role of Cryptology in Information Security Key Management Revisited Chapter Summary Further Reading and Resources Questions Exercises

  • GENERAL COMPUTER SECURITY ARCHITECTURE

    This chapter considers security capabilities within computing and communications devices. It considers the software that resides next to the hardware and controls the use of system resources by applications. The networking subsystem supported by the element software is responsible for the confidentiality and integrity of information transferred among elements, for the authentication of elements to one another, and for user authentication and access control in distributed systems. The chapter focuses on the element security software components, primarily for the kernel, security contexts, security-critical functions, and operating system (OS) implementations. OS implementations structured to use the common kernel interface to obtain basic services should be able to be closely controlled from an authorization perspective relatively easily since most hardware dependencies will be visible only in the kernel and the device drivers. Physical and administrative security mechanisms are the first lines of defense used to achieve security objectives.

  • The Management Strategy

    This chapter contains sections titled: Control Systems Governance An IT Management Model for Information Security Policies, Procedures, and Standards Assigning Information Security Responsibilities Executive Roles Organizational Interfaces Information Security Staff Structure Staffing and Funding Levels Managing Vendors Organizational Culture and Legitimacy Training and Awareness Key Points

  • Authentication of Subjects

    This chapter contains sections titled: Authentication Systems Human Authentication Chapter Summary Further Reading and Resources Questions Exercises

  • COMPUTER SOFTWARE SECURITY

    This chapter considers security of applications, examining security threats to applications, and how to mitigate these threats. It first looks at the various aspects of security in any general-purpose unix and linux operating systems (OSs). The chapter then describes the role-based access control as implemented in the Solaris OS. Based on the protection ring model, Windows security components operate in two modes: the kernel mode (protection ring 0) and the user mode (protection ring 3). Next, the chapter focuses on the VXworks- and pSOS-type embedded OSs as these differ the most from the general-purpose OSs. It also shows how buffer overflows could be exploited in applications through stack and heap manipulations. Application software is a primary target and a major source of security problems. Finally, the chapter looks at anti-malware applications available for windows and unix-type OS.

  • Case Studies

    This chapter contains sections titled: Case Study 1 - Singles Opportunity Services Case Study 2 - Rancho Nachos Mosquito Abatement District Key Points

  • Security Systems Engineering

    This chapter contains sections titled: Security Policy Development Senior Management Oversight and Involvement Security Process Management and Standards Information Security Systems Engineering Methodology Requirements Analysis and Decomposition Access Control Concepts Security Modeling and Security-Related Standards Chapter Summary Questions Exercises



Standards related to Information Security

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards

Jobs related to Information Security

Back to Top