Call for Papers, 2014 Symposium on Cryptography and Authenticat

看板Bugtraq作者時間12年前 (2013/12/22 10:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
------=_Part_66962423_196415046.1382896552830 Content-Type: multipart/related; boundary="----=_Part_66962424_465312683.1382896552830" ------=_Part_66962424_465312683.1382896552830 Content-Type: text/html;charset=utf-8 Content-Transfer-Encoding: quoted-printable <span id=3D"unSub" style=3D"FONT-SIZE: 10pt; FONT-FAMILY: verdana,arial,hel= vetica,sans-serif; line-height:20px;">This message was sent to [bugtraq@sec= urityfocus.com]. <a href=3D"http://www.member.scirp.org/member/transferPara= meterAction.action?personID=3D7835691&identifier=3D5DFD5F85E4BE67FA9AE938BD= E3C7410710FCD66EAA0F449D8C622F82188A7DE0&blackListTypeId=3D3" target=3D"_bl= ank">Unsubscribe</a></span><br/><span id=3D"showTem" style=3D"FONT-SIZE: 10= pt; FONT-FAMILY: verdana,arial,helvetica,sans-serif; line-height:20px;"> If= you cannot read it, please click <a href=3D"http://edm.scirp.org/template= /showTemplateInfo?showId=3D4794&personName=3D" target=3D"_blank">here</a>.<= /span><html> <head></head> <body> <table style=3D"border-bottom:#5f712d 1px solid;border-left:#5f712d 1px s= olid;border-top:#5f712d 1px solid;border-right:#5f712d 1px solid;" class=3D= "ke-zeroborder" border=3D"0" cellspacing=3D"0" cellpadding=3D"0" width=3D"6= 00">=20 <tbody>=20 <tr>=20 <td style=3D"padding-bottom:0px;padding-left:18px;padding-right:18px;p= adding-top:9px;"> <table class=3D"ke-zeroborder" border=3D"0" cellspacing=3D"0" cellpad= ding=3D"0" width=3D"100%">=20 <tbody>=20 <tr>=20 <td style=3D"font-family:Arial, Helvetica, sans-serif;color:#ff996= 6;font-size:24px;" align=3D"center"><strong>Call for Papers </strong></td>= =20 </tr>=20 <tr>=20 <td style=3D"font-family:Arial, Helvetica, sans-serif;color:#ff996= 6;font-size:24px;" align=3D"center"><strong>2014 Symposium on Cryptography = and Authentication (SCA2014) </strong></td>=20 </tr>=20 <tr>=20 <td style=3D"font-family:Arial, Helvetica, sans-serif;color:#ff996= 6;font-size:13pt;" align=3D"right"> <p align=3D"center">Submission Due: Nov= .. 27, 2013 &nbsp;&nbsp; Conference: March 10-12, 2014</p></td>=20 </tr>=20 </tbody>=20 </table></td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:9px;padding-left:18px;padding-right:18px;p= adding-top:9px;"> <table class=3D"ke-zeroborder" border=3D"0" cellspacing=3D"0" cellpad= ding=3D"0" width=3D"100%">=20 <tbody>=20 <tr>=20 <td style=3D"font-family:Arial, Helvetica, sans-serif;color:#fffff= f;font-size:17px;" bgcolor=3D"#ff9966" height=3D"24"><strong>Dear Colleague= s,</strong> </td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:9px;line-height:1.4;padding-left:0px;p= adding-right:0px;font-family:Arial, Helvetica, sans-serif;color:#333333;fon= t-size:17px;padding-top:9px;"> We would like to cordially invite you to sub= mit or recommend papers to 2014 Symposium on Cryptography and Authenticatio= n (SCA2014)! This conference will be held from March 10 to 12, 2014 in Suzh= ou, China. The conference will bring together leading researchers, engineer= s and scientists in the domain of interest from around the world. More deta= iled information can be found at <a target=3D"_blank" href=3D"http://www.en= gii.org/workshop/CIS2014March/Home.aspx?utm_campaign=3Dsca&amp;utm_source= =3De_cp&amp;utm_medium=3De_cp_conf_ws_sca_20131023">www.engii.org/workshop/= CIS2014March</a>. </td>=20 </tr>=20 </tbody>=20 </table></td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:9px;padding-left:18px;padding-right:18px;p= adding-top:9px;"> <table class=3D"ke-zeroborder" border=3D"0" cellspacing=3D"0" cellpad= ding=3D"0" width=3D"100%">=20 <tbody>=20 <tr>=20 <td style=3D"font-family:Arial, Helvetica, sans-serif;color:#fffff= f;font-size:17px;" bgcolor=3D"#ff9966" height=3D"24" colspan=3D"2"><strong>= Related Topics (more can be found in our website) </strong></td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Anti-Virus and Anti-Worms</td>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Key Management and Key Recovery</td>= =20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Database Security</td>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Language-based Security</td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Distributed Systems Security</td>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Security Evaluation</td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Electronic Commerce Security</td>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Security for Mobile Computing</td>= =20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Fraud Control</td>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Security Models</td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Information Security Engineering</td= >=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 System Security</td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Information Privacy</td>=20 <td style=3D"padding-bottom:5px;padding-left:0px;padding-right:0px= ;font-family:Arial, Helvetica, sans-serif;color:#333333;font-size:17px;padd= ing-top:5px;" class=3D"td2"> =E2=80=A2 Signature and Key Agreement Protocol= </td>=20 </tr>=20 </tbody>=20 </table></td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:0px;padding-left:18px;padding-right:18px;p= adding-top:9px;"> <table class=3D"ke-zeroborder" border=3D"0" cellspacing=3D"0" cellpad= ding=3D"0" width=3D"100%">=20 <tbody>=20 <tr>=20 <td style=3D"font-family:Arial, Helvetica, sans-serif;color:#fffff= f;font-size:17px;" bgcolor=3D"#ff9966" height=3D"24"><strong>Technical Prog= ram Committee </strong></td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:9px;line-height:1.4;padding-left:0px;p= adding-right:0px;font-family:Arial, Helvetica, sans-serif;color:#333333;fon= t-size:17px;padding-top:9px;"><p> <b>Prof. Fagen Li</b>, University of Elec= tronic Science and Technology of China<br /> <b>Prof. Xiaochun Cheng</b>, M= iddlesex University<br /> <b>Prof. Vic Grout</b>, Glyndwr University<br /> = <b>Prof. Giannis F. Marias</b>, Athens University of Economics and Business= <br /> <b>Prof. Stavros D. Nikolopoulos</b>, University of Ioannina<br /> <= a target=3D"_blank" href=3D"http://www.engii.org/workshop/CIS2014March/Orga= nizingCommittee.aspx?utm_campaign=3Dsca&amp;utm_source=3De_cp&amp;utm_mediu= m=3De_cp_conf_ws_sca_20131023"> &gt;&gt;More </a></p></td>=20 </tr>=20 </tbody>=20 </table></td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:9px;padding-left:18px;padding-right:18px;p= adding-top:9px;"> <table class=3D"ke-zeroborder" border=3D"0" cellspacing=3D"0" cellpad= ding=3D"0" width=3D"100%">=20 <tbody>=20 <tr>=20 <td style=3D"font-family:Arial, Helvetica, sans-serif;color:#fffff= f;font-size:17px;" bgcolor=3D"#ff9966" height=3D"24"><strong>Publication an= d Presentation</strong></td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:9px;line-height:1.4;padding-left:0px;p= adding-right:0px;font-family:Arial, Helvetica, sans-serif;color:#333333;fon= t-size:17px;padding-top:9px;"> All the accepted papers will be published by= &quot;Journal of Computer and Communications&quot; (ISSN:2327-5219), a pee= r-reviewed open access journal that can ensure the widest dissemination of = your published work.<br /><br /> If you want to present your research resul= ts but do NOT wish to publish a paper, you may simply submit an Abstract to= our <a target=3D"_blank" href=3D"http://www.engii.org/Workshop2014/MarchSu= bmission/index.aspx?utm_campaign=3Dsca&amp;utm_source=3De_cp&amp;utm_medium= =3De_cp_conf_ws_sca_20131023">Registration System</a>. </td>=20 </tr>=20 </tbody>=20 </table></td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:5px;padding-left:18px;padding-right:18px;p= adding-top:0px;"> <table width=3D"100%">=20 <tbody>=20 <tr>=20 <td style=3D"border-bottom:#666666 2px solid;padding-bottom:5px;pa= dding-left:0px;padding-right:0px;font-family:Trebuchet MS,Arial,'TradeGothi= c-CondEighteen',Arial,Helvetica,sans-serif;color:#333333;font-size:13pt;fon= t-weight:bold;padding-top:4px;" class=3D"td">Yours sincerely,</td>=20 </tr>=20 <tr>=20 <td style=3D"padding-bottom:0px;padding-left:0px;padding-right:0px= ;font-family:'TradeGothic-CondEighteen',Arial,Helvetica,sans-serif;color:#3= 33333;font-size:17px;padding-top:0px;" class=3D"td2"> SCA Organizing Commit= tee<br /> Email: CIS@engii.org<br /> Tel : +86- 132 6470 2230</td>=20 </tr>=20 </tbody>=20 </table></td>=20 </tr>=20 </tbody>=20 </table>=20 </body> </html><img id=3D"openURL" src=3D"http://www.member.scirp.org/emailopen/doS= aveLogAction.action?email=3Dbugtraq@securityfocus.com&personId=3D7835691&ta= skId=3D3426" style=3D"display:none;width:1px;height:1px;"> ------=_Part_66962424_465312683.1382896552830-- ------=_Part_66962423_196415046.1382896552830--
文章代碼(AID): #1Ijayc2p (Bugtraq)