Conferences related to Information Security

Back to Top

2014 IEEE Information Theory Workshop (ITW)

ITW2014 is a forum for technical exchange among scientists and engineers working on the fundamentals of information theory. The agenda is broad and will cover the diverse topics that information theory presently impacts. There will be both invited and contributed sessions.

  • 2012 IEEE Information Theory Workshop (ITW 2012)

    The past decade has seen an exponential increase in the data stored in distributed locations in various forms including corporate & personal data, multimedia, and medical data in repositories. The grand challenge is to store, process and transfer this massive amount of data, efficiently and securely over heterogeneous communication networks.

  • 2010 IEEE Information Theory Workshop (ITW 2010)

    Algebraic Methods in Communications Technology

  • 2009 IEEE Information Theory Workshop (ITW 2009)

    Covers the most relevant topics in Information Theory and Coding Theory of interest to the most recent applications to wireless networks, sensor networks, and biology

  • 2008 IEEE Information Theory Workshop (ITW 2008)

    This workshop will take a brief look into the recent information theory past to commemorate the 60th anniversary of Shannon's landmark paper, and then proceed to explore opportunities for information theory research in quantum computation, biology, statistics, and computer science.

  • 2006 IEEE Information Theory Workshop (ITW 2006)


2014 IEEE International Symposium on Information Theory (ISIT)

Annual international symposium on processing, transmission, storage, and use of information, as well as theoretical and applied aspects of coding, communications, and communications networks.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 12th Workshop on Information Optics (WIO)

The workshop has been running for 17 years, starting with the Euro-American Workshop on Optical Pattern Recognition in La Rochelle, 1994. It is a small workshop (typically limited to 30-35 talks), with invited participants broadly from the area of information optics and photonics. Always there has been an emphasis on allowing time for interaction, collaboration, and networking in a friendly atmosphere. Participants stay together for lunch and social outings.Well-known researchers in the fields of optical information processing and advanced imaging techniques regularly attend the conference from Europe, USA, Japan, and Korea, and find it a refreshing, relaxed, and very profitable meeting. Previous workshop locations include Barcelona (1997), Colmar (1999), Valencia (2001), Toledo (2006), Reykjavik (2007), Annecy (2008), Paris (2009), Helsinki (2010), Benicasim (2011) and Quebec (2012).

  • 2012 11th Euro-American Workshop on Information Optics (WIO)

    The workshop will address the latest advances in information optics, information photonics, imaging sciences and engineering, display technologies and 3D displays, 3D image sensing, image-based information security, image recognition, biophotonics, and novel image sensors. It will be a forum for scientific interaction and collaboration between well-known scientists in the field and educational outreach to student.

  • 2011 10th Euro-American Workshop on Information Optics (WIO)

    Fundamental advances in information optics and photonics, including algorithms, devices, and systems. 3D image sensing, processing, and display. Digital holography. Integral imaging. Biophotonics and biomedical imaging. Inverse problems in optics. Image-based security and optical security systems. Polarimetric and multi spectral imaging. Materials and devices for information optics.

  • 2010 9th Euro-American Workshop on Information Optics (WIO)

    information optics, information photonics, imaging sciences and engineering, display technologies and 3D displays, 3D image sensing, image-based information security, image recognition, biophotonics, and novel image sensors


2013 13th Canadian Workshop on Information Theory (CWIT)

The 13th Canadian Workshop on Information Theory will take place in Toronto, Ontario, Canada from Tuesday, May 28, to Friday, May 31, 2013. Previously unpublished contributions from a broad range of topics in information theory and its applications are solicited, including (but not limited to) the following areas: Coded modulation, Coding theory and practice, Communication complexity, Communication systems, Cryptology and data security, Data compression, Detection and estimation, Information theory and statistics, Network coding, Interactive information theory, Pattern recognition and learning, Quantum information processing, Shannon theory, Signal processing, Cognitive radio, Cooperative communication, Multi-terminal information theory, and Information theory in biology. International researchers are welcome to attend and present research at this event.

  • 2011 12th Canadian Workshop on Information Theory (CWIT)

    Applications and practice of information theory

  • 2009 11th Canadian Workshop on Information Theory (CWIT)

    This workshop provides an opportunity for researchers in Information Theory to meet and discuss aspects of their work.

  • 2007 10th Canadian Workshop on Information Theory (CWIT)


More Conferences

Periodicals related to Information Security

Back to Top

Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Industrial Informatics, IEEE Transactions on

IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Intelligent Systems, IEEE

IEEE Intelligent Systems, a bimonthly publication of the IEEE Computer Society, provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently. The editorial staff collaborates with authors to produce technically accurate, timely, useful, and readable articles as part of a consistent and consistently valuable editorial product. The magazine serves software engineers, systems ...


More Periodicals

Most published Xplore authors for Information Security

Back to Top

Xplore Articles related to Information Security

Back to Top

Data hiding in 2-color images

Yu-Chee Tseng; Hsiang-Kuang Pan IEEE Transactions on Computers, 2002

In an earlier paper (Chen et al., 2000), we proposed a steganography scheme for hiding a piece of critical information in a host binary image. That scheme ensures that, in each m × n image block of the host image, as many as [log2 (mn + 1)] bits can be hidden in the block by changing at most 2 bits ...


Democratic detection of malicious behaviour in MANET: A voting process

EO Ochola; MM Eloff; JA van der Poll 2013 Information Security for South Africa, 2013

Wireless MANET presents new security problems in comparison to the conventional wired and wireless networks, as it is more vulnerable to malicious attacks due to its unique features. The MANET routing protocols require that the mobile nodes that form such temporal network cooperate with each other to achieve the desired routing purpose for the exchange of information amongst the participating ...


Efficient detection of failure modes in electronic commerce protocols

S. Gurgens; J. Lopez; R. Peralta Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999

The design of key distribution and authentication protocols has been shown to be error-prone. These protocols constitute the part of more complex protocols used for electronic commerce transactions. Consequently, these new protocols are likely to contain flaws that are even more difficult to find. In this paper, we present a search method for detecting potential security flaws in such protocols. ...


Real-time distributed malicious traffic monitoring for honeypots and network telescopes

Samuel Oswald Hunter; Barry Irwin; Etienne Stalmans 2013 Information Security for South Africa, 2013

Network telescopes and honeypots have been used with great success to record malicious network traffic for analysis, however, this is often done off-line well after the traffic was observed. This has left us with only a cursory understanding of malicious hosts and no knowledge of the software they run, uptime or other malicious activity they may have participated in. This ...


A novel phylogenetic tree data visualization application for researchers

Shahzaib Tahir; Muhammad Tanvir Afzal 2014 Science and Information Conference, 2014

In this paper a graphical application has been presented that attempts to visualize the data stored in a database. A database can contain huge amounts of data but the inherent problem is that this data needs to be visualized to show interrelationships and interdependencies among data items. In this paper we have taken the database of a leading research journal ...


More Xplore Articles

Educational Resources on Information Security

Back to Top

eLearning

Data hiding in 2-color images

Yu-Chee Tseng; Hsiang-Kuang Pan IEEE Transactions on Computers, 2002

In an earlier paper (Chen et al., 2000), we proposed a steganography scheme for hiding a piece of critical information in a host binary image. That scheme ensures that, in each m × n image block of the host image, as many as [log2 (mn + 1)] bits can be hidden in the block by changing at most 2 bits ...


Democratic detection of malicious behaviour in MANET: A voting process

EO Ochola; MM Eloff; JA van der Poll 2013 Information Security for South Africa, 2013

Wireless MANET presents new security problems in comparison to the conventional wired and wireless networks, as it is more vulnerable to malicious attacks due to its unique features. The MANET routing protocols require that the mobile nodes that form such temporal network cooperate with each other to achieve the desired routing purpose for the exchange of information amongst the participating ...


Efficient detection of failure modes in electronic commerce protocols

S. Gurgens; J. Lopez; R. Peralta Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999

The design of key distribution and authentication protocols has been shown to be error-prone. These protocols constitute the part of more complex protocols used for electronic commerce transactions. Consequently, these new protocols are likely to contain flaws that are even more difficult to find. In this paper, we present a search method for detecting potential security flaws in such protocols. ...


Real-time distributed malicious traffic monitoring for honeypots and network telescopes

Samuel Oswald Hunter; Barry Irwin; Etienne Stalmans 2013 Information Security for South Africa, 2013

Network telescopes and honeypots have been used with great success to record malicious network traffic for analysis, however, this is often done off-line well after the traffic was observed. This has left us with only a cursory understanding of malicious hosts and no knowledge of the software they run, uptime or other malicious activity they may have participated in. This ...


A novel phylogenetic tree data visualization application for researchers

Shahzaib Tahir; Muhammad Tanvir Afzal 2014 Science and Information Conference, 2014

In this paper a graphical application has been presented that attempts to visualize the data stored in a database. A database can contain huge amounts of data but the inherent problem is that this data needs to be visualized to show interrelationships and interdependencies among data items. In this paper we have taken the database of a leading research journal ...


More eLearning Resources

IEEE-USA E-Books

  • Intellectual Property and Information Security

    No abstract.

  • SECURITY SYSTEMS ENGINEERING

    This chapter considers how information governance and systems engineering can be applied to achieve information assurance. It looks at vulnerabilities threat agents, attack vectors, and their corresponding impact on risk. A basic component of engineering is the functional or performance-specific detailed requirement. Requirements have to be based on decomposition of policy statements. The security policy provides the foundation for how the organization makes a due diligence effort toward securing assets. Senior management oversight is fundamental to achieving consistent and compliant adherence to the security policy. Involvement of management will facilitate security policy compliance. Employee involvement is necessary to meeting policy mandates. A primary purpose of security management is to ensure that the organization achieves its security goals and objectives, while avoiding unnecessary risks to itself and those it serves. The chapter describes access control and access control structures and looks at simple mathematical structures and their use in access control.

  • SECURITY SYSTEMS DESIGN??-??DESIGNING NETWORK SECURITY

    This chapter first examines protocol layers 1,2, and 3 of the available security mechanisms and explores their deployment possibilities within networking protocols. Network Physical layer media types include: metallic or fiber-optic cables/wires used for interconnecting network elements; radio frequency signals transmitted through air used for wireless communications; or visible, or invisible, laser light signals transmitted through air or water. Within the Data Link layer, the encountered security devices are IEEE 802.1x, IEEE 802. 1ae and IEEE 802.11 WPA and 802.11i. The chapter then considers the security capabilities, uses, and deficiencies for each of these technologies. Next, it covers the advantages and limitations of providing security at the Network layer, via the IP security (IPsec) framework of protocols, for secure channel establishment. Finally, the filtering and inspection of packets are discussed as forms of network and host access control (authorization).

  • No title

    This book deals with "crypto-biometrics", a relatively new and multi- disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto- biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biome rics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks

  • Systems Engineering

    This chapter contains sections titled: So What Is Systems Engineering? Process Management Organization Environments Chapter Summary Further Reading and Resources Questions Exercises

  • WHAT IS SECURITY?

    The central role of computer security for the working of the economy, the defense of the country, and the protection of the individual privacy is universally acknowledged today. Secure information systems must work reliably despite random errors, disturbances, and malicious attacks. This chapter examines a number of general ways of discussing security, including the common body of knowledge (CBK), by-function, and then systems engineering approaches. CBK is the critical body of knowledge that serves as a framework of security concepts, definitions, and principles that foster understanding of best practices among those engaged in activities related to information assurance/security. Confidentiality, integrity, and availability (CIA) are the core tenets of information security and are widespread over all the domains of the CBK. The chapter considers the many general security concepts and complexities associated with issues of safety, and information availability, and enterprise infrastructures. It also discusses some basic perspectives on information security.

  • TRADITIONAL NETWORK CONCEPTS

    This chapter focuses on the concepts and technologies currently found in major networks. It begins with the architectural basis of these networks, moves on to how these networks are structured (deployed), and reviews the protocols used within these networks. The primary network architectures are the International Standards Organization (ISO) open systems interconnection model (OSI) and the internet model. There are a number of physical and logical structures that modern networks rely on, including local area networks (LAN), Wireless LAN (WLAN), metropolitan area networks (MAN), wide area networks (WAN), and internet. The chapter examines the general concepts of protocol layering and interfaces. Three primary transport protocols used in the internet protocol stack are transmission control protocol (TCP), unreliable datagram protocol (UDP) and stream control transmission protocol (SCTP). The chapter considers the capabilities and security mechanisms available for use with simple network management protocol (SNMP) and TR-69.

  • No title

    Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering rep esentative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols

  • The Technology Strategy

    This chapter contains sections titled: Thinking About Technology Planning Technology Implementation Technology Forecasting Technology Strategy Components The Security Strategy Technical Architecture Overall Technical Design The Logical Technology Architecture Specific Technical Components Key Points

  • Notes and References

    Bridging the gap between information security and strategic planningThis publication is a reflection of the author's firsthand experience as an information security consultant, working for an array of clients in the private and public sectors. Readers discover how to work with their organizations to develop and implement a successful information security plan by improving management practices and by establishing information security as an integral part of overall strategic planning.The book starts with an overview of basic concepts in strategic planning, information technology strategy, and information security strategy. A practical guide to defining an information security strategy is then provided, covering the "nuts and bolts" of defining long-term information security goals that effectively protect information resources. Separate chapters covering technology strategy and management strategy clearly demonstrate that both are essential, complementary elements in protecting information.Following this practical introduction to strategy development, subsequent chapters cover the theoretical foundation of an information security strategy, including: Examination of key enterprise planning models that correspond to different uses of information and different strategies for securing information Review of information economics, an essential link between information security strategy and business strategy Role of risk in building an information security strategyTwo separate case studies are developed, helping readers understand how the development and implementation of information security strategies can work within their own organizations.This is essential reading for information security managers, information technology executives, and consultants. By linking in formation security to general management strategy, the publication is also recommended for nontechnical executives who need to protect the value and security of their organization's information.



Standards related to Information Security

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards