1996-09-27 - Call for Papers

Header Data

From: Enzo Michelangeli <enzo@ima.com>
To: cypherpunks@toad.com
Message Hash: 5978edd36b095516c340777ebf9bbdfb8f34ec8ded422f7965f7cb84a2301887
Message ID: <Pine.WNT.3.95.960927163553.-996033E-100000@stanley.ima.net>
Reply To: N/A
UTC Datetime: 1996-09-27 11:24:41 UTC
Raw Date: Fri, 27 Sep 1996 19:24:41 +0800

Raw message

From: Enzo Michelangeli <enzo@ima.com>
Date: Fri, 27 Sep 1996 19:24:41 +0800
To: cypherpunks@toad.com
Subject: Call for Papers
Message-ID: <Pine.WNT.3.95.960927163553.-996033E-100000@stanley.ima.net>
MIME-Version: 1.0
Content-Type: text/plain


FYI...

---------- Forwarded message ----------
Date: Tue, 24 Sep 96 09:49:03 EDT
From: Nick Maxemchuk <nfm@research.bell-labs.com>
To: apc@ee.nthu.edu.tw, apc_members@hornbill.ee.nus.sg,
    commsoft@cc.bellcore.com, enternet@bbn.com, ietf@CNRI.Reston.VA.US,
    itc@fokus.gmd.de, multicomm@cc.bellcore.com, tccc@cs.umass.edu
Subject: Call for Papers


			   CALL	FOR PAPERS
	   IEEE	Journal	on Selected Areas in Communications
		   COPYRIGHT AND PRIVACY PROTECTION

Significant investments	are now	being made worldwide to	develop	an
infrastructure for on-line services and	electronic commerce.  A	major
impediment is the lack of effective protection of copyright for
content	owners and of privacy for users.  Digital data can be easily
copied and redistributed widely	without	any loss of fidelity. One
promising idea is to discourage	illicit	distribution by	watermarking
digital	objects	with hidden copyright messages to proclaim ownership
and unique identifiers to help trace pirates. The techniques of
information hiding are in many ways related to mechanisms that can be
used to	protect	the anonymity of system	users by concealing address,
location and routing information. The problem becomes even more
interesting when privacy protection and	copyright protection must be
combined in the	same system.

We seek	fundamental papers on watermarking of digital data, on
techniques for anonymous communications, and design and	analysis of
systems	that protect copyright and/or privacy.	A partial list of
topics is as follows:

   + watermarking of digital data
   + anonymous communications
   + steganography
   + covert and	subliminal channels in networks	 protocols
   + combining copyright and privacy protection
   + experiments and attacks
   + tradeoffs between performance and security

Prospective authors should email their manuscripts (PostScript format
only) or send six hard copies to one of	the Guest Editors listed
below, according to the	following schedule.  Please direct all email
enquiries to slow@ee.mu.oz.au.

	     Manuscript	Due:		March 1, 1997
	     Acceptance	Notification:	August 1, 1997
	     Final Manuscript Due:	November 1, 1997
	     Publication Date:		2nd Quarter 1998

Ross Anderson				Ingemar	Cox
Cambridge University Computer Lab	NEC Research
Pembroke Street				4 Independence Way
Cambridge CB2 3QG, U.K.			Princeton NJ 08540, USA
Tel: +44 1223 33 47 33			Tel:  +1 609 951 2722
Fax: +44 1223 33 46 78			Fax:  +1 609 951 2482
Email: ross.anderson@cl.cam.ac.uk	Email: ingemar@research.nj.nec.com

Steven Low				Nicholas Maxemchuk
Dept. of Electrical  Electronic	Engr.	ATT Laborataries
University of Melbourne			600 Mountain Ave.
Parkville, Vic 3052, Australia		Murray Hill NJ 07974, USA
Tel: +6	13 9287	9205			Tel:  +1 908 582 6240
Fax: +6	13 9287	9188			Fax:  +1 908 582 5807
Email: slow@ee.mu.oz.au			Email:	nfm@research.att.com






Thread