<div dir="ltr"><div>******* My apologies for receiving multiple copies ******</div><div><br></div><div> Call for Papers</div><div>----------------------------------------</div><div>International Conference on Digital Security and Forensics (DigitalSec2014)</div>
<div>VSB-Technical University of Ostrava, Czech Republic<br></div><div>June 24-26, 2014</div><div><br></div><div>Event website: <a href="http://sdiwc.net/conferences/2014/digitsec2014/">http://sdiwc.net/conferences/2014/digitsec2014/</a></div>
<div><br></div><div>The proposed conference with the theme “ The International Conference on Digital Security and Forensics (DigitalSec2014) that will be held at VSB-Technical University of Ostrava, Czech Republic on June 24-26, 2014. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.</div>
<div>The conference welcomes papers on the following (but not limited to) research topics:</div><div><br></div><div>• Access Controls</div><div>• Antenna Systems and Design</div><div>• Anti-cyberterrorism<span class="" style="white-space:pre">        </span></div>
<div>• Assurance of Service</div><div>• Biometrics Technologies<span class="" style="white-space:pre">        </span></div><div>• Channel Modeling and Propagation</div><div>• Cloud Computing<span class="" style="white-space:pre">        </span></div>
<div>• Coding for Wireless Systems</div><div>• Computational Intelligence<span class="" style="white-space:pre">        </span></div><div>• Computer Crime Prevention and Detection</div><div>• Computer Forensics<span class="" style="white-space:pre">        </span></div>
<div>• Computer Security</div><div>• Confidentiality Protection<span class="" style="white-space:pre">        </span></div><div>• Critical Computing and Storage</div><div>• Critical Infrastructure Management<span class="" style="white-space:pre">        </span></div>
<div>• Cryptography and Data Protection</div><div>• Data Compression<span class="" style="white-space:pre">        </span></div><div>• Data Management in Mobile Peer-to-Peer Networks</div><div>• Data Mining<span class="" style="white-space:pre">        </span></div>
<div>• Data Stream Processing in Mobile/Sensor Networks</div><div>• Digital Communications<span class="" style="white-space:pre">        </span></div><div>• Distributed and Parallel Applications</div><div>• E-Government<span class="" style="white-space:pre">        </span></div>
<div>• E-Learning</div><div>• E-Technology<span class="" style="white-space:pre">        </span></div><div>• Embedded Systems and Software</div><div>• Forensics, Recognition Technologies and Applications<span class="" style="white-space:pre">        </span></div>
<div>• Fuzzy and Neural Network Systems</div><div>• Green Computing<span class="" style="white-space:pre">        </span></div><div>• Grid Computing</div><div>• Information Technology Human Resources<span class="" style="white-space:pre">        </span></div>
<div>• Information Technology Infrastructure</div><div>• Information Technology Strategies<span class="" style="white-space:pre">        </span></div><div>• Mobile Networking, Mobility and Nomadicity</div><div>• Mobile Social Networks</div>
<div>• Mobile, Ad Hoc and Sensor Network Management</div><div>• Multimedia Computing<span class="" style="white-space:pre">        </span></div><div>• Multiuser and Multiple Access Schemes</div><div>• National Policies and Standards<span class="" style="white-space:pre">        </span></div>
<div>• Network Security</div><div>• Optical Wireless Communications<span class="" style="white-space:pre">        </span></div><div>• Peer-to-Peer Social Networks</div><div>• Quality of Service, Scalability and Performance<span class="" style="white-space:pre">        </span></div>
<div>• Resource Allocation over Wireless Networks</div><div>• Security; Authentication and Cryptography for Wireless Networks<span class="" style="white-space:pre">        </span></div><div>• Signal Processing Techniques and Tools</div>
<div>• Software and Cognitive Radio<span class="" style="white-space:pre">        </span></div><div>• System Development and Implementation</div><div>• Technology Developments<span class="" style="white-space:pre">        </span></div>
<div>• Technology Futures</div><div>• Wireless Communications<span class="" style="white-space:pre">        </span></div><div>• Wireless System Architectures and Applications</div><div>• Wireless Traffic and Routing Ad-hoc Networks<span class="" style="white-space:pre">        </span></div>
<div><br></div><div>All registered papers will be included in SDIWC Digital Library, and in the proceedings of the conference. </div><div><br></div><div>Event email ad: <a href="mailto:digitalsec2014@sdiwc.net">digitalsec2014@sdiwc.net</a></div>
<div>Paper Submission: <a href="http://sdiwc.net/conferences/2014/digitsec2014/openconf/openconf.php">http://sdiwc.net/conferences/2014/digitsec2014/openconf/openconf.php</a></div><div>Registration: <a href="http://sdiwc.net/conferences/2014/digitsec2014/registration/">http://sdiwc.net/conferences/2014/digitsec2014/registration/</a></div>
<div><br></div><div>--------------------------</div><div>Important Dates:</div><div><br></div><div>Submission Deadline : May 25, 2014</div><div>Notification of Acceptance : June 04, 2014 or 4 weeks from the submission date</div>
<div>Camera Ready Submission : June 14, 2014</div><div>Registration Date : June 14, 2014 however, it is recommended to do it few days before</div><div>Conference Dates : June 24-26, 2014</div>
<div><br></div><div>Contact email: <a href="mailto:digitalsec2014@sdiwc.net">digitalsec2014@sdiwc.net</a></div></div>