<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type"/>
</head><body style="">
<div>
Apologies for cross-postings.
<br/>Please send it to interested colleagues and students. Thanks!
<br/>
<br/>CALL FOR PAPERS
<br/>
<br/>********************************************************
<br/>World Congress on Internet Security (WorldCIS-2013)
<br/>Technically Co-Sponsored by IEEE Tokyo Section
<br/>August 5-7, 2013
<br/>Venue: Tokyo University of Information Sciences, Japan
<br/>www.worldcis.org
<br/>********************************************************
<br/>
<br/>The World Congress on Internet Security (WorldCIS-2013)
<br/>is Technically Co-Sponsored by IEEE Tokyo Section.
<br/>The WorldCIS-2013 is an international forum dedicated to the
<br/>advancement of the theory and practical implementation of security
<br/>on the Internet and Computer Networks. The inability to properly
<br/>secure the Internet, computer networks, protecting the Internet
<br/>against emerging threats and vulnerabilities, and sustaining privacy
<br/>and trust has been a key focus of research. The WorldCIS aims to
<br/>provide a highly professional and comparative academic research
<br/>forum that promotes collaborative excellence between academia and
<br/>industry.
<br/>
<br/>The objectives of the WorldCIS are to bridge the knowledge
<br/>gap between academia and industry, promote research esteem
<br/>and to fostering discussions on information technologies,
<br/>information systems and global security applications.
<br/>The WorldCIS-2013 invites speakers and researchers to submit
<br/>papers that encompass conceptual analysis, design implementation
<br/>and performance evaluation.
<br/>
<br/>Original papers are invited on recent advances in Internet,
<br/>Computer Communications and Networking Security.
<br/>
<br/>The topics in WorldCIS-2013 include but are not confined
<br/>to the following areas:
<br/>
<br/>*Internet Security
<br/>*Security, trust and privacy
<br/>*Self-organizing networks
<br/>*Sensor nets and embedded systems
<br/>*Service overlays
<br/>*Switches and switching
<br/>*Topology characterization and inference
<br/>*Traffic measurement and analysis
<br/>*Traffic engineering and control
<br/>*Trust and Data Security
<br/>*Virtual and overlay networks
<br/>*Web services and performance
<br/>*Wireless mesh networks and protocols
<br/>*Ad hoc mobile networks Security
<br/>*Addressing and location management
<br/>*Broadband access technologies
<br/>*Blended Internet Security Methods
<br/>*Biometrics
<br/>*Boundary Issues of Internet Security
<br/>*Capacity planning
<br/>*Cellular and broadband wireless nets
<br/>*Congestion control
<br/>*Content distribution
<br/>*Cryptography
<br/>*Cross layer design and optimization
<br/>*Cyber-physical computing/networking
<br/>*Geographic information systems
<br/>*Privacy Protection and Forensic in Ubi-com
<br/>*Quality of Service Issues
<br/>*Regulations
<br/>*Secured Database Systems
<br/>*Security in Data Mining
<br/>*Security and Access Control
<br/>*Semantic Web and Ontology
<br/>*Data management for U-commerce
<br/>*Software Architectures
<br/>*Defence Systems
<br/>*Delay/disruption tolerant networks
<br/>*End Users
<br/>*Enabling technologies for the Internet
<br/>*Implementation and experimental testbeds
<br/>*Future Internet Design and Applications
<br/>*Middleware support for networking
<br/>*Mobility models and systems
<br/>*Multicast and anycast
<br/>*Multimedia protocols and networking
<br/>*Network applications and services
<br/>*Network architectures Network control
<br/>*Network management
<br/>*Network simulation and emulation
<br/>*Novel network architectures
<br/>*Network and Protocol Architectures
<br/>*Peer-to-peer communications
<br/>*Performance evaluation
<br/>*Power control and management
<br/>*Pricing and billing
<br/>*Protocols and Standards
<br/>*Resource allocation and management
<br/>*RFID
<br/>*Optical networks
<br/>*Routing protocols
<br/>*Scheduling and buffer management
<br/>*Virtual Reality
<br/>
<br/>
<br/>IMPORTANT DATES:
<br/>
<br/>Full Paper Submission Date: Extended May 15, 2013
<br/>Extended Abstract (Work in Progress) Submission Date: Extended May 31, 2013
<br/>Proposal for Workshops and Tutorials: Extended May 15, 2013
<br/>Notification of Workshop and Tutorial Acceptance: Extended May 31, 2013
<br/>Proposal for Industrial Presentation: February 25, 2013
<br/>Notification of Extended Abstract Acceptance/Rejection: Extended June 15, 2013
<br/>Notification of Industrial Presentation Acceptance: March 05, 2013
<br/>Notification of Paper Acceptance/Rejection: Extended June 05, 2013
<br/>Camera Ready Extended Abstract Due: Extended June 30, 2013
<br/>Camera Ready Paper Due: Extended till June 30, 2013
<br/>Early Registration Deadline: January 01 to June 20, 2013
<br/>Late Registration Deadline (Authors only): June 21 to July 15, 2013
<br/>Late Registration Deadline (Participants only): June 21 to August 5, 2013
<br/>Conference Dates: August 5-7, 2013
<br/>
<br/>
<br/>For further details, please visit conference website www.worldcis.org
</div>
</body></html>