Conference Information
ISBA 2015: International Conference on Identity, Security and Behavior Analysis
http://www.isba2015.org/
Submission Date:
2014-12-15
Notification Date:
2015-01-20
Conference Date:
2015-03-23
Location:
Hong Kong, China
Viewed: 13108   Tracked: 0   Attend: 0

Call For Papers
The IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015) is a unique conference series initiated by the IEEE Biometrics Council and its first edition will be held in Hong Kong. This conference is intended to meet the emerging need for a winter meeting, especially for the Asian participants where the introduction of large scale biometrics programs have attracted significant increase in research and development efforts. It will be a forum that brings together experts in biometrics, security, and human behavior to consider research issues and solutions that are robust, comprehensive, and broader than currently considered in each of these individual research areas. Success of emerging biometrics technologies also depends on human aspects of biometrics-driven security and balancing high security with the user friendliness. Therefore this conference serves to provide a new form for such broad areas defining human side of security and user behavior as well as social influence in the biometrics security.

ISBA 2015 is intended to have a broad scope, including advances in fundamental biometrics security, new algorithms and/or technologies for biometrics, user-centric security and privacy, balancing user friendliness and high security, and human aspects of biometrics-driven security. Areas of coverage include biometrics based on voice, fingerprint, iris, face, handwriting, gait and other modalities, economics of biometrics security for enduser, security policies and user behavior well as social influence in biometrics security and privacy decisions. Submissions will be rigorously reviewed, and should clearly make the case for a documented improvement over the existing state of the art. The experimental results for contributions in established areas such as face, iris, fingerprint, and gait are encouraged to use the largest and most challenging existing publicly available datasets.
Last updated by Dou Sun in 2014-11-23
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
baCSFIEEE Computer Security Foundations Symposium2026-01-292026-04-012026-07-26
cINSCRYPTInternational Conference on Information Security and Cryptology2025-06-152025-08-012025-10-19
ccNSPWNew Security Paradigms Workshop2025-04-252025-05-302025-08-24
cb2PSTInternational Conference on Privacy, Security and Trust2025-04-042025-06-012025-08-26
cCRiSISInternational Conference on Risks and Security of Internet and Systems2024-09-092024-10-082024-11-26
b4ASIDInternational Conference on Anti-counterfeiting, Security, and Identification2024-08-152024-09-102024-11-01
cWISTPInternational Conference on Information Security Theory and Practice2024-01-152024-02-052024-02-29
bTrustBusInternational Conference on Trust, Privacy, and Security in Digital Business2022-03-072022-05-102022-08-22
bICISCInternational Conference on Information Security and Cryptology2015-09-072015-10-192015-11-25
aIDAInternational Symposium on Intelligent Data Analysis2015-05-082015-07-032015-10-22
Related Journals
CCFFull NameImpact FactorPublisherISSN
cJournal of Information Security and Applications3.7Elsevier2214-2126
International Journal of Information Security3.2Springer1615-5262
Computer Law & Security Review3.2Elsevier0267-3649
cComputer Law and Security Review3.2Elsevier0267-3649
Archive for Rational Mechanics and Analysis2.4Springer0003-9527
Computational Statistics & Data Analysis1.6Elsevier0167-9473
cIET Information Security1.300IET1751-8709
cIntelligent Data Analysis0.900IOS Press1088-467X
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650
Cybernetics and Systems Analysis0.500Springer1060-0396