From 241cb9b78210137a5de34683da8cfaff8d643eea Mon Sep 17 00:00:00 2001 From: =?utf8?q?Jean-Fran=C3=A7ois=20Couchot?= Date: Wed, 9 Nov 2011 16:54:26 +0100 Subject: [PATCH] ajout du cfp --- cfpihtiap.txt | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cfpihtiap.txt diff --git a/cfpihtiap.txt b/cfpihtiap.txt new file mode 100644 index 0000000..331e637 --- /dev/null +++ b/cfpihtiap.txt @@ -0,0 +1,34 @@ +IHTIAP 2012 + +First Information Hiding Techniques for Internet Anonymity and Privacy +June 23, 2012 - Venice, Italy +http://lifc.univ-fcomte.fr/ihtiap2012/ + +Satellite workshop of Internet 2012 +http://www.iaria.org/conferences2012/ProgramINTERNET12.html + +=== Highlights === + +- Invited talks: TBA + + +=== Important Dates === + +February 5, 2012 ................ Full paper submission +March 23, 2012 .................. Notification to authors +April 7, 2012 ................... Registration +April 7, 2012 ................... Camera-ready for pre-proceedings +June 23, 2012 ................... IHTIAP Venice, Italy + + +Tracking Internet behavior users, restricting rules or document access through the Internet are increasingly done by corporations, institutions, etc. +There is thus a reel need of anonymity and privacy to counteract this pain. +The first IHTIAP workshop provides a forum for engineers and scientists in academia, industry, and government to address challenges and to present and discuss their new ideas, research results, applications and experience on aspects of information hiding techniques for internet anonymity and privacy. + + +Topics of interest include, but not limited to: +- Data hiding for anomymity (Digital watermarking, Steganography,...) +- Anonymity and privacy attacks and metric (security model, forensics and counter-forensics, acquisition system identification) +- Anonymity and privacy theory (information theory of privacy, statistics and decision theory for anonymity, Mathematical models) +- Practical uses of anonymity and privacy + -- 2.39.5