From: Enzo Michelangeli <enzo@ima.com>
To: cypherpunks@toad.com
Message Hash: 5978edd36b095516c340777ebf9bbdfb8f34ec8ded422f7965f7cb84a2301887
Message ID: <Pine.WNT.3.95.960927163553.-996033E-100000@stanley.ima.net>
Reply To: N/A
UTC Datetime: 1996-09-27 11:24:41 UTC
Raw Date: Fri, 27 Sep 1996 19:24:41 +0800
From: Enzo Michelangeli <enzo@ima.com>
Date: Fri, 27 Sep 1996 19:24:41 +0800
To: cypherpunks@toad.com
Subject: Call for Papers
Message-ID: <Pine.WNT.3.95.960927163553.-996033E-100000@stanley.ima.net>
MIME-Version: 1.0
Content-Type: text/plain
FYI...
---------- Forwarded message ----------
Date: Tue, 24 Sep 96 09:49:03 EDT
From: Nick Maxemchuk <nfm@research.bell-labs.com>
To: apc@ee.nthu.edu.tw, apc_members@hornbill.ee.nus.sg,
commsoft@cc.bellcore.com, enternet@bbn.com, ietf@CNRI.Reston.VA.US,
itc@fokus.gmd.de, multicomm@cc.bellcore.com, tccc@cs.umass.edu
Subject: Call for Papers
CALL FOR PAPERS
IEEE Journal on Selected Areas in Communications
COPYRIGHT AND PRIVACY PROTECTION
Significant investments are now being made worldwide to develop an
infrastructure for on-line services and electronic commerce. A major
impediment is the lack of effective protection of copyright for
content owners and of privacy for users. Digital data can be easily
copied and redistributed widely without any loss of fidelity. One
promising idea is to discourage illicit distribution by watermarking
digital objects with hidden copyright messages to proclaim ownership
and unique identifiers to help trace pirates. The techniques of
information hiding are in many ways related to mechanisms that can be
used to protect the anonymity of system users by concealing address,
location and routing information. The problem becomes even more
interesting when privacy protection and copyright protection must be
combined in the same system.
We seek fundamental papers on watermarking of digital data, on
techniques for anonymous communications, and design and analysis of
systems that protect copyright and/or privacy. A partial list of
topics is as follows:
+ watermarking of digital data
+ anonymous communications
+ steganography
+ covert and subliminal channels in networks protocols
+ combining copyright and privacy protection
+ experiments and attacks
+ tradeoffs between performance and security
Prospective authors should email their manuscripts (PostScript format
only) or send six hard copies to one of the Guest Editors listed
below, according to the following schedule. Please direct all email
enquiries to slow@ee.mu.oz.au.
Manuscript Due: March 1, 1997
Acceptance Notification: August 1, 1997
Final Manuscript Due: November 1, 1997
Publication Date: 2nd Quarter 1998
Ross Anderson Ingemar Cox
Cambridge University Computer Lab NEC Research
Pembroke Street 4 Independence Way
Cambridge CB2 3QG, U.K. Princeton NJ 08540, USA
Tel: +44 1223 33 47 33 Tel: +1 609 951 2722
Fax: +44 1223 33 46 78 Fax: +1 609 951 2482
Email: ross.anderson@cl.cam.ac.uk Email: ingemar@research.nj.nec.com
Steven Low Nicholas Maxemchuk
Dept. of Electrical Electronic Engr. ATT Laborataries
University of Melbourne 600 Mountain Ave.
Parkville, Vic 3052, Australia Murray Hill NJ 07974, USA
Tel: +6 13 9287 9205 Tel: +1 908 582 6240
Fax: +6 13 9287 9188 Fax: +1 908 582 5807
Email: slow@ee.mu.oz.au Email: nfm@research.att.com
Return to September 1996
Return to “Enzo Michelangeli <enzo@ima.com>”
1996-09-27 (Fri, 27 Sep 1996 19:24:41 +0800) - Call for Papers - Enzo Michelangeli <enzo@ima.com>