Prague, Czech Republic, September 24-26, 2012 PLENARY
SPEAKERS
CONFERENCE PROGRAM
HISTORY OF THIS CONFERENCE
http://www.wseas.us/reports/2009/prague/index.html
Unlimited Access in E-Library: Delegates attending the conference will receive a new username and password without expiry date for unlimited on-line access in the WSEAS Conference proceedings (1996-...) for ever.
Review Process: In WSEAS events, the Review is coordinated by the staff of the Sponsoring Universities in Collaboration with the International Scientific Committee. The responsibility of acceptance/rejection belongs to the collaborating / sponsoring Universities (and not to the WSEAS).
Join them as Reviewer using this form http://www.wseas.org/reviewersoffer.htm
List of Reviewers....
Additional Features:
1)
Delegates attending the conference will be invited to
submit an extended version of their paper for publication in
NAUN and University Press journals
(Indexed in SCOPUS, AMS, ACS, ZENTRALBLATT, ULRICH,
MATHSCINE, DPP, DBP, ACM, INSPEC, IET (IEEE),
COMPENDEX, ELSEVIER, EI, Engineering Village, ScholarGoogle,
PUBMED, MEDLINE, CSA, CSBA, DEST, EBSCO, EMBASE, GEOBASE,
BIOBASE,BIOTECHNOBASE. and many others see
http://www.wseas.us/indexes
...)
2) Delegates attending the conference will receive in their briefcase:
*2a ****
Proceedings in hard copy (Indexed by
ISI Web of Knowledge, SCOPUS, EI Compendex, ProQuest and
Scitech Book News. Index to Scientific and Technical
Proceedings, PUBMED,MEDLINE, ACM, IET (IEE), ASM, ACS, CSA,
ELSEVIER , ZENTRALBLATT, MATHSCINET, DPP,EI, CSBA, Ulrigh,
DEST, EBSCO, EMBASE, GEOBASE, BIOBASE,BIOTECHNOBASE)
*2b ****
CD-ROM
Proceedings for all the co-located conferences
(Indexed by ISI Web of Knowledge,
SCOPUS, EI Compendex, ProQuest and Scitech Book News. Index
to Scientific and Technical Proceedings, PUBMED,MEDLINE,
ACM, IET (IEE), ASM, ACS, CSA, ELSEVIER , ZENTRALBLATT,
MATHSCINET, DPP,EI, CSBA, Ulrigh, DEST, EBSCO, EMBASE,
GEOBASE, BIOBASE,BIOTECHNOBASE)
*2c ****Certification
of Indexing
*2d **** Unlimited
Access in the Society's E-Library
*2e ****
JOURNAL PUBLICATION: A written invitation to upload their
paper in NAUN and UNIVERSITY PRESS
(Indexed in SCOPUS, EI Compendex, ProQuest and Scitech Book
News. Index to Scientific and Technical Proceedings,
PUBMED,MEDLINE, ACM, IET (IEE), ASM, ACS, CSA, ELSEVIER ,
ZENTRALBLATT, MATHSCINET, DPP,EI, CSBA, Ulrigh, DEST, EBSCO,
EMBASE, GEOBASE, BIOBASE,BIOTECHNOBASE) All conference books
are archived in the British Library and American Library of
Congress.
*2f ****A
second elegant CD-ROM with more than 85 textbooks -
monographies (Every book is a textbook for postgraduates
written by an expert, internationally pioneers on his field)
* 2g ***
Rich Social and Cultural Part (banquet,
coffee-breaks as:
www.wseas.org/reports
)
TOPICS
Threat and attacks to information:
Passive attacks,
Access control
Accountability
Anonymity
Application security
Attacks and defenses
Authentication
Censorship and censorship-resistance
Distributed systems security
Embedded systems security
Forensics
Hardware security
Intrusion detection
Language-based security
Malware
Metrics
Network security
Privacy-preserving systems
Protocol security
Secure information flow Security and privacy policies
Security architectures
System security
Usability and security
Web security
active attacks, viruses,
trojan horses, worms, denial of
service.
Information security services:
authentication,
access control, confidentiality, integrity,
non-repudiation, secret sharing, database security,
operating systems security.
Modeling and analysis for information security:
protocols and its logical analysis,
performance
analysis, risk analysis.
Standards of information security:
AES, IPSec,
Common
Criteria.
Infrastructure for information security:
Public Key
Infrastructure,
Certification Authority.
Tools for information security:
Smart cards, biometrics,
watermarking, intrusion detection, scanners, mobile
agents.
Applications of information security:
E-commerce,
E- health
information systems,
mobile telephony,
E-banking,
E-voting,
entertainment industry.
Cryptography:
algorithms,
hardware implementation,
simulation,
performance analysis.
Advanced topics in security:
quantum cryptography.
Multilateral Security:
Relationship between privacy and
security, privacy enhancing technologies, anonymity
techniques,
high-tech crime prevention, information
hiding.
Any relevant topic and application in science, engineering and in real life.