您好,欢迎登录Mr.confs会先生官方网站!

ICMISI 2021: 15. International Conference on Multimedia Information Security and Intelligence

时间:2021-01-18 至 2021-01-19

ICMISI 2021: 15. International Conference on Multimedia Information Security and Intelligence
收藏0
ICMISI 2021: 15. International Conference on Multimedia Information Security and Intelligence
会议时间:2021-01-18 至 2021-01-19
会议地点: Rome, Italy,Rome,Italy 周边酒店预订

发票类型: 不支持开票
参会凭证:其它

门票信息
Participation Type Early Registration Fees Registration Fees
Non-Student Oral/Poster Presenter Registration € 450 € 500
Student Oral/Poster Presenter Registration € 350 € 400
Listener Registration € 250 € 300
Additional Paper Publication € 100
会议介绍

The International Research Conference Aims and Objectives

The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.

ICMISI 2021: 15. International Conference on Multimedia Information Security and Intelligence aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Multimedia Information Security and Intelligence. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Multimedia Information Security and Intelligence

Call for Contributions

Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters. Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of Multimedia Information Security and Intelligence are cordially invited for presentation at the conference. The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of novel research materials.

Guidelines for Authors

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission Guideline, Abstract Submission Guideline and Author Information before submitting your paper.

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICMISI 2021 has teamed up with the Special Journal Issue on Multimedia Information Security and Intelligence. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Selected Papers

  1. Eight-State BB84: A C# Simulation
    Liliana Zisu
  2. Context Aware Anomaly Behavior Analysis for Smart Home Systems
    Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
  3. Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
    Georgi Bebrov, Rozalina Dimova
  4. Analysis of Network Performance Using Aspect of Quantum Cryptography
    Nisarg A. Patel, Hiren B. Patel
  5. An Authentication Protocol for Quantum Enabled Mobile Devices
    Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel
  6. Off-Policy Q-learning Technique for Intrusion Response in Network Security
    Zheni S. Stefanova, Kandethody M. Ramachandran
  7. Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography
    D. M. S. Bandara, Yunqi Lei, Ye Luo
  8. A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations
    Ramon Santana
  9. FPGA Implementation of the BB84 Protocol
    Jaouadi Ikram, Machhout Mohsen
  10. Secure E-Pay System Using Steganography and Visual Cryptography
    K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
  11. Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
    Anthony Overmars, Sitalakshmi Venkatraman
  12. Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
    Carlos Gonzalez
  13. Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
    Andrii Shalaginov, Katrin Franke, Xiongwei Huang
  14. VANETs: Security Challenges and Future Directions
    Jared Oluoch
  15. Secure Cryptographic Operations on SIM Card for Mobile Financial Services
    Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas
Mohammed Rezaul Karim Guildhall College, UK
Poonam Dharam Saginaw Valley State University, US
Rajasekhar Chaganti University of Texas at San Antonio, US
Douglas Kelly Johns Hopkins University Applied Physics Laboratory, US
Yizhen Liu Research Institue of Huawei at U.S., US
Niraj Shakhakarmi Prairie View A and M University, US
Danda Rawat Old Dominion University, US
Shiping Chen Sybase, Inc, US
Fangyang Shen Ali Northern New Mexico College, US
Guangzhi Qu Oakland University, US
Te - Shun Chou East Carolina University, US
Kamal Alezabi UCSI University, MY
Khaled Nagaty The British University in Egypt, EG
Sudhanshu Gonge Vishwakarma Institute of Technology, IN
Yevgen Kotukh University of Customs and Finance, UA
Renjith V Ravi MEA Engineering College, IN
Xiangjun Xin Zhengzhou University of Light Industry, CN
Ghassan Kbar Melbourne Institute of Technology, AU
Pl Sharma Himachal Pradesh University Shimla, India, IN
Dipti Sarmah Symbiosis International University, IN
Akula V S Giridhar BS Institute of Technology, IN
Akshaykumar Meshram Yeshwantrao Chavan College of Engineering, IN
Kamaljit Singh Saini Chandigarh University, IN
Liliana Zisu Technical Military Academy of Bucharest, RO
Sridevi R K Ramakrishnan College of Engineering, IN
Rakhi Mutha Poornima Institute of Engineering and Technology, IN
Vince Paul Universal Engineering College/ APJ Abdulkalam Technological University, IN
Tze Jin Wong Universiti Putra Malaysia, Bintulu Campus, MY
Tun Myat Aung University of Computer Studies, MM
Mohammed Alia Al Zaytoonah University of Jordan, JO
会议日程
Abstracts/Full-Text Paper Submission Deadline   December 15, 2020
Notification of Acceptance/Rejection   December 30, 2020
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   December 17, 2020
Conference Dates   January 18-19, 2021
参会指南
会议地点
×