Prague, Czech Republic, September 24-26, 2012                                 PLENARY SPEAKERS 
CONFERENCE PROGRAM                                                      HISTORY OF THIS CONFERENCE


REPORT and PHOTOS from the previous WSEAS Conference in Prague (2009):
http://www.wseas.us/reports/2009/prague/index.html

Unlimited Access in E-Library: Delegates attending the conference will receive a new username and password without expiry date for unlimited on-line access in the WSEAS Conference proceedings (1996-...) for ever.

Review Process: In WSEAS events, the Review is coordinated by the staff of the Sponsoring Universities in Collaboration with the International Scientific Committee. The responsibility of acceptance/rejection belongs to the collaborating / sponsoring Universities (and not to the WSEAS).
Join them as Reviewer using this form http://www.wseas.org/reviewersoffer.htm
List of Reviewers....

Additional Features:
1) Delegates attending the conference will be invited to submit an extended version of their paper for publication in NAUN and University Press journals (Indexed in SCOPUS, AMS, ACS, ZENTRALBLATT, ULRICH, MATHSCINE, DPP, DBP, ACM, INSPEC, IET (IEEE),  COMPENDEX, ELSEVIER, EI, Engineering Village, ScholarGoogle, PUBMED, MEDLINE, CSA, CSBA, DEST, EBSCO, EMBASE, GEOBASE, BIOBASE,BIOTECHNOBASE. and many others see  http://www.wseas.us/indexes ...)

2) Delegates attending the conference will receive in their briefcase:

*2a ****  Proceedings in hard copy (Indexed by ISI Web of Knowledge, SCOPUS, EI Compendex, ProQuest and Scitech Book News. Index to Scientific and Technical Proceedings, PUBMED,MEDLINE, ACM, IET (IEE), ASM, ACS, CSA, ELSEVIER , ZENTRALBLATT, MATHSCINET, DPP,EI, CSBA, Ulrigh, DEST, EBSCO, EMBASE, GEOBASE, BIOBASE,BIOTECHNOBASE)

*2b  ****
CD-ROM Proceedings for all the co-located conferences
(Indexed by ISI Web of Knowledge, SCOPUS, EI Compendex, ProQuest and Scitech Book News. Index to Scientific and Technical Proceedings, PUBMED,MEDLINE, ACM, IET (IEE), ASM, ACS, CSA, ELSEVIER , ZENTRALBLATT, MATHSCINET, DPP,EI, CSBA, Ulrigh, DEST, EBSCO, EMBASE, GEOBASE, BIOBASE,BIOTECHNOBASE)

*2c  ****Certification of Indexing

*2d **** Unlimited Access in the Society's E-Library

*2e ****
JOURNAL PUBLICATION: A written invitation to upload their paper in  NAUN and UNIVERSITY PRESS (Indexed in SCOPUS, EI Compendex, ProQuest and Scitech Book News. Index to Scientific and Technical Proceedings, PUBMED,MEDLINE, ACM, IET (IEE), ASM, ACS, CSA, ELSEVIER , ZENTRALBLATT, MATHSCINET, DPP,EI, CSBA, Ulrigh, DEST, EBSCO, EMBASE, GEOBASE, BIOBASE,BIOTECHNOBASE) All conference books are archived in the British Library and American Library of Congress.

*2f  ****
A second elegant CD-ROM with more than 85 textbooks - monographies (Every book is a textbook for postgraduates written by an expert, internationally pioneers on his field)

* 2g *** Rich Social and Cultural Part (banquet, coffee-breaks as:  www.wseas.org/reports )

 

TOPICS

Threat and attacks to information:
Passive attacks, Access control
Accountability
Anonymity
Application security
Attacks and defenses
Authentication
Censorship and censorship-resistance
Distributed systems security
Embedded systems security
Forensics
Hardware security
Intrusion detection
Language-based security
Malware
Metrics
Network security
Privacy-preserving systems
Protocol security
Secure information flow Security and privacy policies
Security architectures
System security
Usability and security
Web security
active attacks, viruses,
trojan horses, worms, denial of service.

Information security services:
authentication,
access control, confidentiality, integrity,
non-repudiation, secret sharing, database security,
operating systems security.

Modeling and analysis for information security:
protocols and its logical analysis,
performance analysis, risk analysis.

Standards of information security:
AES, IPSec,
Common Criteria.

Infrastructure for information security:
Public Key Infrastructure,
Certification Authority.

Tools for information security:
Smart cards, biometrics, watermarking, intrusion detection, scanners, mobile agents.

Applications of information security:
E-commerce,
E- health information systems,
mobile telephony,
E-banking, E-voting,
entertainment industry.

Cryptography: algorithms,
hardware implementation,
simulation,
performance analysis.

Advanced topics in security:
quantum cryptography.

Multilateral Security:

Relationship between privacy and security, privacy enhancing technologies, anonymity techniques,
high-tech crime prevention, information hiding.

Any relevant topic and application in science, engineering and in real life.
 


  

COMMITTEE

Prof. Wenke Lee, Georgia Tech., USA
Prof. Ben Livshits, Microsoft Research
Prof. Michael Locasto, University of Calgary, Canada
Prof. Sergio Maffeis, Imperial College London, UK
Prof. Z. Morley Mao, University of Michigan, USA
Prof. Jon McCune, Carnegie Mellon University, USA
Prof. Patrick McDaniel, Penn State University, USA
Prof. John Mitchell, Stanford University, USA
Prof. David Molnar, Microsoft Research, USA
Prof. Giovanni Vigna, UC Santa Barbara, USA
Prof. Somesh Jha, University of Wisconsin, Madison, USA
Prof. Giuseppe Ateniese, Johns Hopkins University
Prof. Michael Backes, Saarland University and Max Planck Institute for Software Systems
Prof. Michael Bailey, University of Michigan, USA
Prof. Lujo Bauer, Carnegie Mellon University, USA
Prof. David Brumley, Carnegie Mellon University, USA
Prof. Cristian Cadar, Imperial College London, UK
Prof. Steven Gribble, University of Washington, USA
Prof. Virgil Gligor, Carnegie Mellon University, USA
Prof. Guofei Gu, Texas A&M University, USA
Prof. Thorsten Holz, Bochum University, Germany
Prof. Trent Jaeger, Penn State University, USA
Prof. Farnam Jahanian, University of Michigan, USA
Prof. Yoshi Kohno, University of Washington, USA
Prof. Engin Kirda, Eurecom, France
Prof. Shuo Chen, Microsoft Research, USA
Prof. Weidong Cui, Microsoft Research, USA
Prof. Robert Cunningham, MIT Lincoln Laboratory, USA
Prof. Anupam Datta, Carnegie Mellon University, USA
Prof. Adam Barth, UC Berkeley, USA
Prof. Bruno Blanchet, Ecole Normale Supérieure, France
Prof. Stephen Chong, Harvard University, USA
Prof. George Danezis, Microsoft Research, UK
Prof. Ulfar Erlingsson, Reykjavik University, Iceland
Prof. Andy Gordon, Microsoft Research, United Kingdom
Prof. Matteo Maffei, Saarland University, Germany
Prof. Catherine Meadows, NRL, USA
Prof. Jon Millen, MITRE, USA
Prof. John Mitchell, Stanford University, USA
Prof. Mark Ryan, Uni Birmingham, United Kingdom
Prof. David Sands, Chalmers, Sweden
Prof. Vitaly Shmatikov, The University of Texas at Austin, USA
Prof. David Evans, University of Virginia, USA
Prof. Nick Feamster, GeorgiaTech, USA
Prof. Kevin Fu, UMass Amherst, USA
Prof. Debin Gao, Singapore Management University, Singapore
Prof. Jon Giffin, GeorgiaTech, USA Prof. Shriram Krishnamurthi, Brown University, USA
Prof. Christopher Kruegel, UC Santa Barbara, USA
Prof. Andrew Myers, Cornell University, USA
Prof. Cristina Nita-Rotaru, Purdue University, USA
Prof. Adrian Perrig, Carnegie Mellon University, USA
Prof. Mike Reiter, University of North Carolina, USA
Prof. William Robertson, UC Berkeley, USA
Prof. Hovav Shacham, UC San Diego, USA
Prof. Stuart Schechter, Microsoft Research, USA
Prof. R. Sekar, Stony Brook University, USA
Prof. Radu Sion, Stony Brook University, USA
Prof. Sean Smith, Dartmouth College
Prof. Angelos Stavrou, George Mason University, USA
Prof. Ed Suh, Cornell University, USA
Prof. Patrick Traynor, Georgia Tech, USA
Prof. Venkat Venkatakrishnan, University of Illinois, Chicago, USA
Prof. David Wagner, UC Berkeley, USA
Prof. Dan Wallach, Rice University, USA
Prof. XiaoFeng Wang, Indiana University, USA
Prof. Brent Waters, UT Austin, USA

PLENARY SPEAKERS

Plenary Lecture 1:

New Authentication Methods of Symmetric Cryptographic Check Values
by Prof. Nataša Živić, University of Siegen, GERMANY.

 

SUBMIT A SPECIAL SESSION

The Organizing Committee can accept proposal for Special Sessions from qualified scientists that want to contribute to this event. Special sessions have the prestige of a really targeted audience.

On the other hand, it has been observed that in special sessions all (or almost all) the papers are presented as well as several discussions with serious comments and questions take place after the presentation. Many successfull WSEAS Conferences started in the beginning as Special Sessions or Workshops in some previous WSEAS conference.
You could submit a session online using the following form:
http://www.wseas.org/sessionproposal.htm

 

LOCATION

 

REGISTRATION FEES

The registration fees must be paid in EUR
550 EUR for every author (max.,number of pages 6, extra fee 100 EUR for each extra page)

250 EUR for each additional paper

It includes: Publication of your paper(s) in an ISI Book (Thomson),
CD-ROM + evaluation of the paper for the Journals of NAUN / University Press with free PDF for all the academic community after the conference, a previous book (from 2007 or Journal), 2 coffee-breaks per day and one banquet in the Hotel.

 

FORMAT

The Organizing Committee can accept only *.pdf or *.ps or *.doc or *.rtf format. The Organizing Committee prefer *.pdf though)

1. PDF: For the format of the your Paper(s), please, download the file wseas.pdf. To read this file, you must have the Acrobat Reader program.

2. Word for Windows: We can also accept papers in Word for Windows (Microsoft). In this case, you could download the file wseas-full.rtf (you must have in your computer Word for Windows). Please, click here and get : wseas.rtf

3. If you use LaTeX, please download the LaTeX template: wseas.tex or wseas.txt. You have to convert it to .ps file and submit your .ps file to the conference via the web site.

4. If you use a different  Word Processor, please, first download the file wseas.pdf or  wseas.rtf read it using Acrobat Reader or Word for Windows, print out it and then make the necessary modifications in your word processor program (if needed) in order to agree with this format. If you are a TeX or LaTeX user, please, don't send TeX or LaTeX files (i.e. TeX or LaTeX code), but a Postscript file (.ps) or better for us the final PDF file (*.pdf)

INDEXES

Books and Proceedings related to this WSEAS Conference are covered by:

1. ISI (ISINET)
2. INSPEC (IET, former IEE)
3. CSA (Cambridge Scientific Abstracts)
4. ELSEVIER and Elsevier Bibliographic Database
5. ZENTRALBLATT
6. ULRICH
7. MATHSCINET of AMS (American Mathematical Society)
8. MATHEMATICAL REVIEWS of AMS (American Mathematical Society)
9. Directory of Published Proceedings
10. Computer Science Bibliography Administrator
11. American Chemical Society and its Index: Chemical Abstracts Service
12. European Library in Paris (France)
13. DEST Database (Australia)
14. Engineering Information
15. SCOPUS
16. EBSCO
17. EMBASE
18. Compendex (CPX)
19. GEOBASE
20. BIOBASE.
21. BIOTECHNOBASE
22. FLUIDEX
23. OceanBase
24. BEILSTEIN Abstracts
25. World Textiles
26. MEDLINE
27. British Library
28. National Library of Greece
29. German National Library of Science and Technology
30. IARAS Index


JOURNALS:
Delegates attending the conference will be invited to submit an extended version of their paper for publication in one of the NAUN Journals or University Press Journals

No-show authors will be excluded from any further publication in  Journals, regardless of the quality of their papers. Additionally, they will be required to pay extra shipping and handling fees in order for the organizing committee to mail out their registration receipt, CD-ROM proceedings, and one volume of the hard-copy proceedings.
These journals are covered by:

1. ISI through the INSPEC (IEE) (not as independent ISI Journals)
2. INSPEC (IET, former IEE)
3. CSA (Cambridge Scientific Abstracts)
4. ELSEVIER and Elsevier Bibliographic Database
5. ZENTRALBLATT
6. MATHSCINET of AMS (American Mathematical Society)
7. ULRICH
8. MATHEMATICAL REVIEWS of AMS (American Mathematical Society)
9. Computer Science Bibliography Administrator
10. British Library
11. American Chemical Society and its Index: Chemical Abstracts Service
12. European Library in Paris (France)
13. DEST Database (Australia)
14. Swets Information Services
15. Engineering Information
16. SCOPUS
17. EBSCO
18. EMBASE
19. Compendex (CPX)
20. Geobase
21. BIOBASE
22. BIOTECHNOBASE
23. FLUIDEX
24. OceanBase
25. BEILSTEIN Abstracts
26. World Textiles
27. MEDLINE
28. Mayersche
29. Index of Information Systems Journals
30. National Library of Greece: See the link: NLG-Journals
31. IARAS Index

DEADLINES


Submission Deadline: July 24, 2012
Registration Deadline: August 31, 2012

 

HISTORY OF THIS WSEAS CONFERENCE

Rio De Janeiro, Brazil, 2002
New York, USA, 2003
Rio De Janeiro, Brazil, 2004
Tenerife, Spain, 2005
Venice, Italy, 2006
Tenerife, Spain, 2007
Cairo, Egypt, 2008
Tenerife, Spain, 2009
Merida, Venezuela, 2010
Jakarta Indonesia, 2011
Prague, Czech Republic, 2012

PRESENTATION INFORMATION:

General Information
*
Please check the session schedule on the program that you will receive by email after the registration deadline to see which day and time you are presenting. The duration of a presentation slot is 20 minutes (15 minutes for your lecture and 5 minutes for questions-discussion). An LCD projector and a computer (MS Windows XP) with a CD-ROM drive, USB ports, and presentation software (MS PowerPoint, Adobe Acrobat Reader) will be available in all the conference rooms for lecture presentations.
* It is highly recommended to have your own pointe. Over-head Projector cannot be used. Only computer presentation (computer - data projector) will be allowed.

Preparation of Visuals
*
Before the beginning of each session, each presenter must deliver his CV (Short Biography) which must be printed out according to the format: http://www.worldses.org/drafts/biography.doc
* Please note that individuals using computer projection must bring a CD or USB memory key containing their presentation. Speakers should arrive in their session room 10 minutes before the start of their session to hand the presenter’s personal data sheet (biography) to the chairperson.

General Considerations
*
Limit the number of words per visual to no more than 30. Leave space, at least the height of a capital letter, between lines of text.
* All fonts, including those on graphs, should be 18 point or larger.
* Graphs and charts should have bold lines and symbols that contrast sharply with the background.
* Your presentation time is about 15 minutes, leaving about 5 minutes for questions from the audience.
* A reasonable presentation time for each slide is about 2 minutes, as any shorter interval will make it difficult for the audience to understand.
* Do not waste visuals where they are not needed. Use them where a picture, chart, diagram, or cartoon will help. Tables of figures are hard to read and understand quickly, use pie charts or column graphs instead.
* If it takes longer than 10 seconds to comprehend a visual, then there’s too much material in it. Do not put anything on the visual if you don't need it. Tell what each visual is all about, but do not read from it. Keep it on screen, as long as your talk refers to it.