<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type"/>
</head><body>
<p style="margin: 0px;"> </p>
<div style="margin: 5px 0px;">
<div>
<div style="position: relative;">
<div style="margin: 5px 0px;">
<div>
<div style="position: relative;">
<div style="margin: 5px 0px;">
<div>
<div style="position: relative;">
<div style="margin: 5px 0px;">
<div>
<div style="position: relative;">
<div style="margin: 5px 0px;">
<div>
<div style="position: relative;">
<div style="margin: 5px 0px;">
<div>
<div style="position: relative;">
<div style="margin: 5px 0px;">
<div>
<div style="position: relative;">
<div style="margin: 5px 0px;">
<div>
<div style="position: relative;">
<p style="margin: 0px;">Apologies for cross-postings!</p>
<p> </p>
<p>Kindly email this Call for Papers to your colleagues, faculty members and postgraduate students.</p>
<p> </p>
<p> </p>
<p>CALL FOR PAPERS</p>
<p> </p>
<p>*********************************************************************************************************</p>
<p> </p>
<p>The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012),</p>
<p>Technical Co-Sponsored by IEEE UK/RI Computer Chapter</p>
<p>December 10–12, 2012, London, UK</p>
<p><a href="http://www.icitst.org">www.icitst.org</a></p>
<p> </p>
<p>*********************************************************************************************************                              </p>
<p>     </p>
<p>The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) is</p>
<p>Technical Co-sponsored by IEEE UK/RIComputer Chapter. The ICITST is an international refereed conference</p>
<p>dedicated to the advancement of the theory and practical implementation of secured Internet transactions</p>
<p>and to fostering discussions on information technology evolution. The ICITST aims to provide a highly</p>
<p>professionaland comparative academic research forum that promotes collaborativeexcellence between academia</p>
<p>and industry.                                                                                                              </p>
<p> </p>
<p>The topics in ICITST-2012 include but are not confined to the following areas:</p>
<p> </p>
<p>Internet Application and Technology:</p>
<p>* Internet Architecture</p>
<p>* Internet of things</p>
<p>* Broadband Access Technologies</p>
<p>* Application Agents</p>
<p>* Boundary Issues of Internet Security</p>
<p>* Database Management</p>
<p>* Data Models for Production Systems and Services</p>
<p>* Artificial Intelligence and Expert Systems</p>
<p>* IPSec Quality of Service</p>
<p>* Knowledge Management</p>
<p>* Embedded Systems</p>
<p>* Defence Systems</p>
<p> </p>
<p>Ubi/Cloud Computing:</p>
<p>* Authentication and Access Control for Data Protection in Ubi/Cloud Computing</p>
<p>* Context-Awareness and its Data Mining for UbiCom</p>
<p>* Data Grids</p>
<p>* Distributed Information Systems</p>
<p>* Human-Computer Interface and Interaction for UbiCom</p>
<p>* Ubiquitous Systems</p>
<p>* USN/RFID Service</p>
<p>* Smart Homes and its Business Model for UbiCom Service</p>
<p>* Security and its Data Management for UbiCom</p>
<p>* Peer to Peer Data Management</p>
<p>* New Novel Mechanism and Application for Ubi/Cloud Computing</p>
<p> </p>
<p>Information Security:</p>
<p>* Trust, Privacy and Data Security</p>
<p>* Network Security Issues and Protocols</p>
<p>* Security Challenges and Content Authoring</p>
<p>* Cryptography</p>
<p>* Secure Communications</p>
<p>* Authentication Techniques</p>
<p>* Chaos-based Data Security</p>
<p>* MANET Security</p>
<p>* Wireless Sensor Network Security</p>
<p>* Organization Considerations in Security Policy Formulation and Implementations</p>
<p>* Digital Forensics and Crimes</p>
<p>* Biometrics</p>
<p>* Cyber Security</p>
<p> </p>
<p>Multimedia and Web Services:</p>
<p>* Intelligent Multimedia and its Data Management</p>
<p>* Multimedia Information Systems</p>
<p>* Multimedia Security</p>
<p>* Web Databases</p>
<p>* Web Metrics and its Applications</p>
<p>* Web Mining including Web Intelligence and Web 3.0.</p>
<p>* Web Services</p>
<p>* XML and other extensible languages</p>
<p>* Semantic Web and Ontology</p>
<p> </p>
<p>Infonomics and e-Technology:</p>
<p>* Infonomics</p>
<p>* Information Visualization</p>
<p>* Information Management</p>
<p>* Information Quality</p>
<p>* Technology-Enabled Information</p>
<p>* e-Learning</p>
<p>* e-Commerce</p>
<p>* e-Business</p>
<p>* e-Government</p>
<p>* e-Society</p>
<p>* System Design and Security for e-Services</p>
<p>* Synchronizing e-Security</p>
<p> </p>
<p>Paper submission</p>
<p>To submit a paper, please visit http://www.icitst.org/Paper%20Submission.html</p>
<p> </p>
<p>IMPORTANT DATES</p>
<p>Full Paper Submission Date: August 01, 2012</p>
<p>Extended Abstract (Work in Progress) Submission Date: August 15, 2012</p>
<p>Proposal for Workshops and Tutorials: August 31, 2012</p>
<p>Notification of Workshop and Tutorial Acceptance: September 10, 2012</p>
<p>Proposal for Industrial Presentation: July 15, 2012</p>
<p>Notification of Extended Abstract Acceptance/Rejection: September 01, 1012</p>
<p>Notification of Industrial Presentation Acceptance: July 30, 2012</p>
<p>Notification of Paper Acceptance/Rejection: September 05, 2012</p>
<p>Camera Ready Extended Abstract Due: October 10, 2012</p>
<p>Camera Ready Paper Due: October 20, 2012</p>
<p>Early Registration Deadline (Authors only): September 20, 2012</p>
<p>Late Registration Deadline (Authors only): November 01, 2012</p>
<p>Participants Registration: May 01 to December 09, 2012</p>
<p>Conference Dates: December 10-12, 2012</p>
<p> </p>
<p>For more details, please contact info@icitst.org</p>
<p style="margin: 0px;"> </p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body></html>