<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type"/>
 </head><body>
 
 
  <p style="margin: 0px;">&#160;</p> 
  <div style="margin: 5px 0px;"> 
   <div> 
    <div style="position: relative;"> 
     <div style="margin: 5px 0px;"> 
      <div> 
       <div style="position: relative;"> 
        <div style="margin: 5px 0px;"> 
         <div> 
          <div style="position: relative;"> 
           <div style="margin: 5px 0px;"> 
            <div> 
             <div style="position: relative;"> 
              <div style="margin: 5px 0px;"> 
               <div> 
                <div style="position: relative;"> 
                 <div style="margin: 5px 0px;"> 
                  <div> 
                   <div style="position: relative;"> 
                    <div style="margin: 5px 0px;"> 
                     <div> 
                      <div style="position: relative;"> 
                       <div style="margin: 5px 0px;"> 
                        <div> 
                         <div style="position: relative;"> 
                          <p style="margin: 0px;">Apologies for cross-postings!</p> 
                          <p>&#160;</p> 
                          <p>Kindly email this Call for Papers to your colleagues, faculty members and postgraduate students.</p> 
                          <p>&#160;</p> 
                          <p>&#160;</p> 
                          <p>CALL FOR PAPERS</p> 
                          <p>&#160;</p> 
                          <p>*********************************************************************************************************</p> 
                          <p>&#160;</p> 
                          <p>The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012),</p> 
                          <p>Technical Co-Sponsored by IEEE UK/RI Computer Chapter</p> 
                          <p>December 10–12, 2012, London, UK</p> 
                          <p><a href="http://www.icitst.org">www.icitst.org</a></p> 
                          <p>&#160;</p> 
                          <p>*********************************************************************************************************&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;</p> 
                          <p>&#160;&#160;&#160;&#160;&#160;</p> 
                          <p>The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) is</p> 
                          <p>Technical Co-sponsored by IEEE UK/RIComputer Chapter. The ICITST is an international refereed conference</p> 
                          <p>dedicated to the advancement of the theory and practical implementation of secured Internet transactions</p> 
                          <p>and to fostering discussions on information technology evolution. The ICITST aims to provide a highly</p> 
                          <p>professionaland comparative academic research forum that promotes collaborativeexcellence between academia</p> 
                          <p>and industry.&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;</p> 
                          <p>&#160;</p> 
                          <p>The topics in ICITST-2012 include but are not confined to the following areas:</p> 
                          <p>&#160;</p> 
                          <p>Internet Application and Technology:</p> 
                          <p>* Internet Architecture</p> 
                          <p>* Internet of things</p> 
                          <p>* Broadband Access Technologies</p> 
                          <p>* Application Agents</p> 
                          <p>* Boundary Issues of Internet Security</p> 
                          <p>* Database Management</p> 
                          <p>* Data Models for Production Systems and Services</p> 
                          <p>* Artificial Intelligence and Expert Systems</p> 
                          <p>* IPSec Quality of Service</p> 
                          <p>* Knowledge Management</p> 
                          <p>* Embedded Systems</p> 
                          <p>* Defence Systems</p> 
                          <p>&#160;</p> 
                          <p>Ubi/Cloud Computing:</p> 
                          <p>* Authentication and Access Control for Data Protection in Ubi/Cloud Computing</p> 
                          <p>* Context-Awareness and its Data Mining for UbiCom</p> 
                          <p>* Data Grids</p> 
                          <p>* Distributed Information Systems</p> 
                          <p>* Human-Computer Interface and Interaction for UbiCom</p> 
                          <p>* Ubiquitous Systems</p> 
                          <p>* USN/RFID Service</p> 
                          <p>* Smart Homes and its Business Model for UbiCom Service</p> 
                          <p>* Security and its Data Management for UbiCom</p> 
                          <p>* Peer to Peer Data Management</p> 
                          <p>* New Novel Mechanism and Application for Ubi/Cloud Computing</p> 
                          <p>&#160;</p> 
                          <p>Information Security:</p> 
                          <p>* Trust, Privacy and Data Security</p> 
                          <p>* Network Security Issues and Protocols</p> 
                          <p>* Security Challenges and Content Authoring</p> 
                          <p>* Cryptography</p> 
                          <p>* Secure Communications</p> 
                          <p>* Authentication Techniques</p> 
                          <p>* Chaos-based Data Security</p> 
                          <p>* MANET Security</p> 
                          <p>* Wireless Sensor Network Security</p> 
                          <p>* Organization Considerations in Security Policy Formulation and Implementations</p> 
                          <p>* Digital Forensics and Crimes</p> 
                          <p>* Biometrics</p> 
                          <p>* Cyber Security</p> 
                          <p>&#160;</p> 
                          <p>Multimedia and Web Services:</p> 
                          <p>* Intelligent Multimedia and its Data Management</p> 
                          <p>* Multimedia Information Systems</p> 
                          <p>* Multimedia Security</p> 
                          <p>* Web Databases</p> 
                          <p>* Web Metrics and its Applications</p> 
                          <p>* Web Mining including Web Intelligence and Web 3.0.</p> 
                          <p>* Web Services</p> 
                          <p>* XML and other extensible languages</p> 
                          <p>* Semantic Web and Ontology</p> 
                          <p>&#160;</p> 
                          <p>Infonomics and e-Technology:</p> 
                          <p>* Infonomics</p> 
                          <p>* Information Visualization</p> 
                          <p>* Information Management</p> 
                          <p>* Information Quality</p> 
                          <p>* Technology-Enabled Information</p> 
                          <p>* e-Learning</p> 
                          <p>* e-Commerce</p> 
                          <p>* e-Business</p> 
                          <p>* e-Government</p> 
                          <p>* e-Society</p> 
                          <p>* System Design and Security for e-Services</p> 
                          <p>* Synchronizing e-Security</p> 
                          <p>&#160;</p> 
                          <p>Paper submission</p> 
                          <p>To submit a paper, please visit http://www.icitst.org/Paper%20Submission.html</p> 
                          <p>&#160;</p> 
                          <p>IMPORTANT DATES</p> 
                          <p>Full Paper Submission Date: August 01, 2012</p> 
                          <p>Extended Abstract (Work in Progress) Submission Date: August 15, 2012</p> 
                          <p>Proposal for Workshops and Tutorials: August 31, 2012</p> 
                          <p>Notification of Workshop and Tutorial Acceptance: September 10, 2012</p> 
                          <p>Proposal for Industrial Presentation: July 15, 2012</p> 
                          <p>Notification of Extended Abstract Acceptance/Rejection: September 01, 1012</p> 
                          <p>Notification of Industrial Presentation Acceptance: July 30, 2012</p> 
                          <p>Notification of Paper Acceptance/Rejection: September 05, 2012</p> 
                          <p>Camera Ready Extended Abstract Due: October 10, 2012</p> 
                          <p>Camera Ready Paper Due: October 20, 2012</p> 
                          <p>Early Registration Deadline (Authors only): September 20, 2012</p> 
                          <p>Late Registration Deadline (Authors only): November 01, 2012</p> 
                          <p>Participants Registration: May 01 to December 09, 2012</p> 
                          <p>Conference Dates: December 10-12, 2012</p> 
                          <p>&#160;</p> 
                          <p>For more details, please contact info@icitst.org</p> 
                          <p style="margin: 0px;">&#160;</p> 
                         </div> 
                        </div> 
                       </div> 
                      </div> 
                     </div> 
                    </div> 
                   </div> 
                  </div> 
                 </div> 
                </div> 
               </div> 
              </div> 
             </div> 
            </div> 
           </div> 
          </div> 
         </div> 
        </div> 
       </div> 
      </div> 
     </div> 
    </div> 
   </div> 
  </div> 
 
</body></html>