ICITST-2014. The International Conference for Internet Technology and Secured Transactions

 

ICITST Logo

Pending
IEEE Technical Co-sponsorship

London Pictures

 

The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)

December 8-10, 2014, London, UK

Free Post-Conference London Tour (Travel Information)

 

 

Workshops and Tutorials

The ICITST has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice, Internet Technologies, Secured Transactions, Application of Agents, Human-Computer Interface and Interaction for Ubi-com, Cybernetics, Data Mining, E-Society, Web Services, Semantic Web and Ontology, Mobile, Ad Hoc and Sensor Network Security, Digital Information Management and identify emerging research topics.

The workshops and tutorials provide researchers the opportunity for presenting novel ideas in a less formal and possibly more focused way. It offers a good opportunity for young researchers to present their work and to obtain feedback from an interested community.

Organising Workshop or Tutorial

The workshop or tutorial duration can be one day or one and half day. All the accepted papers will be included in the conference proceedings. You can consider organising a workshop that is related to ICITST-2014 topics. The purpose of these workshops is to provide a platform for presenting novel ideas in a less formal and possibly more focused way than the conferences themselves. It offers a good opportunity for young researchers to present their work and to obtain feedback from an interested community. The format of each workshop or tutorial is to be determined by the organisers, but it is expected that they contain ample time for general discussion. The preference is for one day workshops, but other schedules will also be considered.

The proposal must include:
1. The name of the workshop or Tutorial.
2. A statement of goals for the workshop.
3. The names and addresses of the organisers.
4. The names of potential participants, such as program committee members.
5. A description of the plans for call for participation (e.g., call for papers).
6. The expected number of attendees and the planned length of the workshop.
7. The topic of the workshop should be relevant to the main conference and details of any previous workshops.
8. The URL of the workshop web site.

All workshop proposals are blind reviewed by the workshop organisers. The workshop or tutorial paper submission and author notification due dates are at the discretion of the workshop organisers but not later than October 31, 2014 in order to be included in the main conference proceedings.

For all workshop organizers, if the workshop receives more than 20 valid submissions or accepts more than 10 quality papers at ICITST- 2014, the organisers will receive one free registration and ICITST-2014 outstanding service certificate.

If you are interested in organising workshop or tutorial for the ICITST-2014, please email your proposal to workshop-tutorial@icitst.org Your proposal will be reviewed by the Steering Committee.

 

Accepted Workshops

 

 

Workshops

 

Organisers

 

Contact E-mails

 

The 4rd International Workshop on Information Security, Theory and Practice (ISTP-2014)

 

Safwan El Assad, Ecole polytechnique de l’université de Nantes, France
Charles A. Shoniregun, Infonomics-Society, UK

 

safwan.elassad@univ-nantes.fr

 

The 13th Workshop on E-Learning Security (ELS-2014)

 

Galyna Akmayeva, Infonomics Society, Ireland
Charles A. Shoniregun, Infonomics Society, UK
Kinshuk, Athabasca University, Canada

 

els-2013@icitst.org

 
The 6th International Workshop on RFID Security and Cryptography 2014 (RISC’14)

 

Jamal Zemerly, KUSTAR, UAE
Chan Yeob Yeun, KUSTAR, UAE

 
jamal@kustar.ac.ae
cyeun@kustar.ac.ae

 

Ubiquitous Computing Security Issues (UCSI' 14)

 

George S. Oreku, TIRDO/North West University, South Africa
Fredrick Mtenzi, Dublin Institute of Technology, Republic of Ireland


 

George.oreku@gmail.com
Fredrick.Mtenzi@comp.dit.ie

 
The 2nd International workshop on Big Data and Social Networking Management and Security (BDSN-2014)


Elhadj Benkhelifa, Staffordshire University, UK
Yaser Jararweh, JUST, Jordan
Abdallah Khreishah, New Jersey Institute of Technology, USA



E.Benkhelifa@staffs.ac.uk

 

Cloud Applications and Security (CAS’14)

 

Ella Pereira, Edge Hill University, UK
Michael Mackay, Liverpool John Moores University, UK

 

Pereirae@edgehill.ac.uk
M.I.Mackay@ljmu.ac.uk

 

Copyright © ICITST Privacy Policy