<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type" />
<title></title>
</head>
<body>
<p style="margin: 0px;">Submission deadline has been extended due to several requests.<br />
<br />
****************** Apologies for cross-posting *************<br />
<br />
************************************************************<br />
The 5th International Conference for Internet Technology and<br />
Secured Transactions (ICITST-2010), Technical Co-Sponsored<br />
by IEEE UK/RI Communications Chapter<br />
November 8–11, 2010, London, UK<br />
(www.icitst.org) <br />
************************************************************                   <br />
                                                                                         <br />
                                        <br />
The ICITST is an international refereed conference dedicated<br />
to the advancement of the theory and practical implementation<br />
of secured Internet transactions and to fostering discussions<br />
on information technology evolution. The ICITST aims to provide<br />
a highly professional and comparative academic research forum<br />
that promotes collaborative excellence between academia and<br />
industry. The objectives of the ICITST are to bridge the<br />
knowledge gap between academia and industry, promote research<br />
esteem in secured Internet transactions and the importance of<br />
information technology evolution to secured transactions.<br />
The ICITST-2010 invites research papers that encompass conceptual<br />
analysis, design implementation and performance evaluation.<br />
All the accepted papers will appear in the proceedings published<br />
by IEEE and fully indexed by IEEE Xplore. All the ICITST papers<br />
are indexed by DBLP.<br />
<br />
 <br />
The topics in ICITST-2010 include but are not confined to the<br />
following areas:<br />
 <br />
*  Application of agents<br />
*  Application security<br />
*  Blended Internet security methods<br />
*  Biometrics<br />
*  Boundary issues of Internet security<br />
*  Broadband access technologies<br />
*  Challenges of content authoring<br />
*  Data mining security<br />
*  E-society<br />
*  Globalisation of information society<br />
*  Government, and corporate Internet security policy<br />
*  Internet architecture<br />
*  Infonomics<br />
*  IPSec quality of services<br />
*  Patentability<br />
*  Regulation, self-regulation, and co-regulation Web services<br />
*  Secured database systems<br />
*  Synchronising e-security<br />
*  Software Architectures<br />
*  Technology-enabled information<br />
*  Trust, privacy, and data security<br />
*  Wireless transactions<br />
*  Context-Awareness and its Data mining for Ubi-com service<br />
*  Human-Computer Interface and Interaction for Ubi-com<br />
*  Smart Homes and its business model for Ubi-com service<br />
*  Intelligent Multimedia Service and its Data management for Ubi-com<br />
*  USN / RF-ID for Ubi-com service<br />
*  Network security issues, protocols, data security in Ubi-com<br />
*  Database protection for Ubi-com<br />
*  Privacy Protection and Forensic in Ubi-com<br />
*  Multimedia Security in Ubi-com<br />
*  Quality of Service Issues<br />
*  Authentication and Access control for data protection in Ubi-com<br />
*  Information visualization<br />
*  Web services<br />
*  Service, Security and its Data management for U-commerce<br />
*  New novel mechanism and Applications for Ubi-com<br />
*  Information Management<br />
*  Multimedia Information Systems<br />
*  Information Retrieval<br />
*  Natural Language Processing<br />
*  Digital Libraries<br />
*  Data and Information Quality Management<br />
*  Data Grids, Data and Information Quality<br />
*  Database Management<br />
*  Web Databases<br />
*  Temporal and Spatial Databases<br />
*  Data Mining<br />
*  Web Mining including Web Intelligence and Web 3.0<br />
*  E-Learning, eCommerce, e-Business and e-Government<br />
*  Web Metrics and its applications<br />
*  XML and other extensible languages<br />
*  Semantic Web and Ontology<br />
*  Human-Computer Interaction<br />
*  Artificial Intelligence and Expert Systems<br />
*  Knowledge Management<br />
*  Ubiquitous Systems<br />
*  Peer to Peer Data Management<br />
*  Interoperability<br />
*  Mobile Data Management<br />
*  Data Models for Production Systems and Services<br />
*  Data Exchange issues and Supply Chain<br />
*  Data Life Cycle in Products and Processes<br />
*  Case Studies on Data Management, Monitoring and Analysis<br />
*  Security and Access Control<br />
*  Embedded Systems<br />
*  Defence Systems<br />
*  Information Content Security<br />
*  Software Architecture<br />
*  System design and verification<br />
*  Mobile, Ad Hoc and Sensor Network Security<br />
*  Distributed information systems<br />
<br />
IMPORTANT DATES<br />
 <br />
Full Paper Submission Date: Extended June 30, 2010<br />
Notification of Paper Acceptance/Rejection: Before July 31, 2010<br />
Camera Ready Extended Abstract Due: Before August 15, 2010<br />
Camera Ready Paper Due: Before August 15, 2010<br />
Early Registration Deadline: January 01 to August 15, 2010<br />
Late Registration Deadline: August 15 to November 08, 2010<br />
Conference Dates: November 08-11, 2010<br />
<br />
The ICITST also encourages organisations to submit their Job Fair<br />
Booth Reservations and/or Exhibit Proposals. If your organisation<br />
is interested, kindly submit a brief Proposal (not more than 1 side<br />
of A4 page) to jobfair@icitst.org<br />
<br />
For more details, please visit www.icitst.org<span></span></p>
</body>
</html>