<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type"/>
 </head><body style="">
 
 
  <div>
   Apologies for cross-postings. 
   <div> 
    <div> 
     <div> 
      <div> 
       <div> 
        <div> 
         <div> 
          <div> 
           <div> 
            <div> 
             <div> 
              <div> 
               <div> 
                <div> 
                 <div> 
                  <div> 
                   <div> 
                    <div> 
                     <div> 
                      <div> 
                       <div> 
                        <div> 
                         <div> 
                          <div> 
                           <div> 
                            <div> 
                             <div>
                              Please send it to interested colleagues and students. Thanks! 
                              <br/> 
                              <div>
                               <br/>CALL FOR PAPERS 
                               <br/> 
                               <br/>****************************************************************** 
                               <br/>World Congress on Internet Security (WorldCIS-2013) 
                               <br/>Technically Co-Sponsored by IEEE Tokyo Section 
                               <br/>August 5-7, 2013 
                               <br/>Venue: Tokyo University of Information Sciences, Japan 
                               <br/>www.worldcis.org 
                               <br/>****************************************************************** 
                               <br/> 
                               <br/>The World Congress on Internet Security (WorldCIS-2013) 
                               <br/>is Technically Co-Sponsored by IEEE Tokyo Section. 
                               <br/>The WorldCIS-2013 is an international forum dedicated to the 
                               <br/>advancement of the theory and practical implementation of security 
                               <br/>on the Internet and Computer Networks. The inability to properly 
                               <br/>secure the Internet, computer networks, protecting the Internet 
                               <br/>against emerging threats and vulnerabilities, and sustaining privacy 
                               <br/>and trust has been a key focus of research. The WorldCIS aims to 
                               <br/>provide a highly professional and comparative academic research 
                               <br/>forum that promotes collaborative excellence between academia and 
                               <br/>industry. 
                               <br/> 
                               <br/>The objectives of the WorldCIS are to bridge the knowledge 
                               <br/>gap between academia and industry, promote research esteem 
                               <br/>and and to fostering discussions on information technologies, 
                               <br/>information systems and globa security applications. 
                               <br/>The WorldCIS-2013 invites speakers and researchers to submit 
                               <br/>papers that encompass conceptual analysis, design implementation 
                               <br/>and performance evaluation. 
                               <br/> 
                               <br/>Original papers are invited on recent advances in Internet, 
                               <br/>Computer Communications and Networking Security. 
                               <br/> 
                               <br/>The topics in WorldCIS-2013 include but are not confined 
                               <br/>to the following areas: 
                               <br/> 
                               <br/>*Internet Security 
                               <br/>*Security, trust and privacy 
                               <br/>*Self-organizing networks 
                               <br/>*Sensor nets and embedded systems 
                               <br/>*Service overlays 
                               <br/>*Switches and switching 
                               <br/>*Topology characterization and inference 
                               <br/>*Traffic measurement and analysis 
                               <br/>*Traffic engineering and control 
                               <br/>*Trust and Data Security 
                               <br/>*Virtual and overlay networks 
                               <br/>*Web services and performance 
                               <br/>*Wireless mesh networks and protocols 
                               <br/>*Ad hoc mobile networks Security 
                               <br/>*Addressing and location management 
                               <br/>*Broadband access technologies 
                               <br/>*Blended Internet Security Methods 
                               <br/>*Biometrics 
                               <br/>*Boundary Issues of Internet Security 
                               <br/>*Capacity planning 
                               <br/>*Cellular and broadband wireless nets 
                               <br/>*Congestion control 
                               <br/>*Content distribution 
                               <br/>*Cryptography 
                               <br/>*Cross layer design and optimization 
                               <br/>*Cyber-physical computing/networking 
                               <br/>*Geographic information systems 
                               <br/>*Privacy Protection and Forensic in Ubi-com 
                               <br/>*Quality of Service Issues 
                               <br/>*Regulations 
                               <br/>*Secured Database Systems 
                               <br/>*Security in Data Mining 
                               <br/>*Security and Access Control 
                               <br/>*Semantic Web and Ontology 
                               <br/>*Data management for U-commerce 
                               <br/>*Software Architectures 
                               <br/>*Defence Systems 
                               <br/>*Delay/disruption tolerant networks 
                               <br/>*End Users 
                               <br/>*Enabling technologies for the Internet 
                               <br/>*Implementation and experimental testbeds 
                               <br/>*Future Internet Design and Applications 
                               <br/>*Middleware support for networking 
                               <br/>*Mobility models and systems 
                               <br/>*Multicast and anycast 
                               <br/>*Multimedia protocols and networking 
                               <br/>*Network applications and services 
                               <br/>*Network architectures Network control 
                               <br/>*Network management 
                               <br/>*Network simulation and emulation 
                               <br/>*Novel network architectures 
                               <br/>*Network and Protocol Architectures 
                               <br/>*Peer-to-peer communications 
                               <br/>*Performance evaluation 
                               <br/>*Power control and management 
                               <br/>*Pricing and billing 
                               <br/>*Protocols and Standards 
                               <br/>*Resource allocation and management 
                               <br/>*RFID 
                               <br/>*Optical networks 
                               <br/>*Routing protocols 
                               <br/>*Scheduling and buffer management 
                               <br/>*Virtual Reality 
                               <br/> 
                               <br/> 
                               <br/>IMPORTANT DATES: 
                               <br/> 
                               <br/>Full Paper Submission Date: Extended May 15, 2013 
                               <br/>Extended Abstract (Work in Progress) Submission Date: Extended May 31, 2013 
                               <br/>Proposal for Workshops and Tutorials: Extended May 15, 2013 
                               <br/>Notification of Workshop and Tutorial Acceptance: Extended May 31, 2013 
                               <br/>Proposal for Industrial Presentation: February 25, 2013 
                               <br/>Notification of Extended Abstract Acceptance/Rejection: Extended June 15, 2013 
                               <br/>Notification of Industrial Presentation Acceptance: March 05, 2013 
                               <br/>Notification of Paper Acceptance/Rejection: Extended June 05, 2013 
                               <br/>Camera Ready Extended Abstract Due: Extended June 30, 2013 
                               <br/>Camera Ready Paper Due: Extended till June 30, 2013 
                               <br/>Early Registration Deadline: January 01 to June 20, 2013 
                               <br/>Late Registration Deadline (Authors only): June 21 to July 15, 2013 
                               <br/>Late Registration Deadline (Participants only): June 21 to August 5, 2013 
                               <br/>Conference Dates: August 5-7, 2013 
                               <br/> 
                               <br/> 
                               <br/>For further details, please visit conference website www.worldcis.org 
                               <br/>&#160;
                              </div> 
                             </div> 
                             <div>
                              <br/>&#160;
                             </div> 
                            </div> 
                            <div>
                             <br/>&#160;
                            </div> 
                           </div> 
                           <div>
                            <br/>&#160;
                           </div> 
                          </div> 
                          <div>
                           <br/>&#160;
                          </div> 
                         </div> 
                         <div>
                          <br/>&#160;
                         </div> 
                        </div> 
                        <div>
                         <br/>&#160;
                        </div> 
                       </div> 
                       <div>
                        <br/>&#160;
                       </div> 
                      </div> 
                      <div>
                       <br/>&#160;
                      </div> 
                     </div> 
                     <div>
                      <br/>&#160;
                     </div> 
                    </div> 
                    <div>
                     <br/>&#160;
                    </div> 
                   </div> 
                   <div>
                    <br/>&#160;
                   </div> 
                  </div> 
                  <div>
                   <br/>&#160;
                  </div> 
                 </div> 
                 <div>
                  <br/>&#160;
                 </div> 
                </div> 
                <div>
                 <br/>&#160;
                </div> 
               </div> 
               <div>
                <br/>&#160;
               </div> 
              </div> 
              <div>
               <br/>&#160;
              </div> 
             </div> 
             <div>
              <br/>&#160;
             </div> 
            </div> 
            <div>
             <br/>&#160;
            </div> 
           </div> 
           <div>
            <br/>&#160;
           </div> 
          </div> 
          <div>
           <br/>&#160;
          </div> 
         </div> 
         <div>
          <br/>&#160;
         </div> 
        </div> 
        <div>
         <br/>&#160;
        </div> 
       </div> 
       <div>
        <br/>&#160;
       </div> 
      </div> 
      <div>
       <br/>&#160;
      </div> 
     </div> 
     <div>
      <br/>&#160;
     </div> 
    </div> 
    <div>
     <br/>&#160;
    </div> 
   </div> 
   <div>
    <br/>&#160;
   </div> 
  </div> 
  <div>
   <br/>&#160;
  </div>
 
</body></html>