<div dir="ltr"><p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"> <br></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span> </span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">Apologies for cross-posting. Kindly help
to distribute this CFP to your mailing list.<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:black">---
The 13rd International Conference on Information Assurance and Security
(IAS ’17) ---<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span lang="EN-US" style="color:black"><a href="http://www.mirlabs.net/ias17">http://www.mirlabs.net/ias17</a><span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span lang="EN-US" style="color:black"><a href="http://www.mirlabs.org/ias17">http://www.mirlabs.org/ias17</a><span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:black">Marrakech,
MOROCCO. (</span><span lang="EN-US">December 11-13, 2017</span><span lang="EN-US" style="color:black">)<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span lang="EN-US" style="font-size:12pt;font-family:Cambria,serif">History of IAS series:</span></b><span lang="EN-US" style="font-size:12pt;font-family:Cambria,serif"> <a href="http://www.mirlabs.net/ias17/previous.php">http://www.mirlabs.net/ias17/previous.php</a><span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">    ** Important Dates **<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">----------------------------------<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">Paper submission due: September 30,
2017<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">Notification of paper acceptance:
October 31, 2017<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">Registration and Final manuscript due:
November 15, 2017<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">Conference: December 11 - 13, 2017<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">About IAS'17 :<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">-------------------------<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:black">The
International Conference on Information Assurance and Security (IAS) is a major
international conference aims to bring together researchers, practitioners,
developers, and policy makers involved in multiple disciplines of information
security and assurance to exchange ideas and to learn the latest development in
this important field. Information assurance and security has become an
important research issue in the networked and distributed information sharing
environments. Finding effective ways to protect information systems, networks
and sensitive data within the critical information infrastructure is
challenging even with the most advanced technology and trained professionals. </span><span lang="EN-US">All accepted and registered papers will be included
in the conference proceedings to expected be published by Springer.<br>
<br>
<br>
Topics ( not limited to )<br>
-----------------------------<br>
</span><span lang="EN-US" style="font-size:9.5pt;font-family:"Segoe UI",sans-serif;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Information Assurance, Security Mechanisms,
Methodologies and Models</span><span lang="EN-US" style="font-size:9.5pt;font-family:"Segoe UI",sans-serif;color:black"><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Authentication and Identity</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Management Authorization and Access Control</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Trust Negotiation, Establishment and Management</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Anonymity and User Privacy</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Data Integrity and Privacy</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Network Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Operating System Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Database Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Intrusion Detection</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Security Attacks</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Security Oriented System Design</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Security and Performance trade-off</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Security Management and Strategy</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Security Verification, Evaluations and
Measurements</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Secure Software Technologies</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">New Ideas and Paradigms for Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Cryptography</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Cryptographic Protocols</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Key Management and Recovery</span><br>
<br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Secure System Architectures and Security Application</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Web Services Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Grid Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Ubiquitous Computing Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Mobile Agent Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Internet Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Intellectual Property Protection</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">E-Commerce Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">E-Government Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">E-Health Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Home System Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Sensor Network Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Ad hoc network security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Biometrics Security and Applications</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Secure Hardware and Smartcards</span><br>
<br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Image Engineering, Multimedia Signal Processing
and Communication Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Multimedia Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Multimedia Forensic</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Digital Watermarking and DRM</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Communication Security</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Biometrics</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Information Fusion</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Image Registration</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Image Mosaic</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Image Indexing and Retrieval</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Image and Video Coding</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Multiscale Geometric Analysis</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Motion Detection and Tracing</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Feature Extraction</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">3G Communication</span><br>
<span style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Embedded System Design</span></span><span lang="EN-US"><span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">Submission Guidelines:<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:rgb(59,59,59)">------------------------------------------------------</span><span lang="EN-US"><span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">Submission of paper should be made
through the submission page from the conference web page. Please refer to the
conference website for guidelines to prepare your manuscript.<br>
<br>
Paper format templates:<br>
</span><span lang="EN-US"><a href="http://www.springer.com/series/11156" target="_blank">http://www.springer.com/series/11156</a></span><span lang="EN-US"><br>
<br>
Proceedings are expected to be published by the Advances in Intelligent and
Soft Computing, which is now indexed by ISI Proceedings, DBLP. Ulrich's,
EI-Compendex, SCOPUS, Zentralblatt Math, MetaPress, Springerlink Proceedings
will be made available during the conference. Expanded versions
of selected papers will be published in special issues of internationally
referred journals (indexed by SCI) and edited volumes.<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">IAS’17 Submission : </span><span lang="EN-US"><a href="https://easychair.org/conferences/?conf=ias2017">https://easychair.org/conferences/?conf=ias2017</a> .<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">* Organizing Committee *<br>
----------------------------------<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:black">General
Chairs:<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:black">Abdelkrim
Haqiq, Hassan 1stUniversity, Settat, Morocco<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:black">Ajith
Abraham, Machine Intelligence Research Labs (MIR Labs), USA<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:black">Layth
Sliman, EFREI, Paris, France<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US" style="color:black">Adel
M. Alimi, University of Sfax, Tunisia<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US">Technical Committee ( Please refer
website ) :<span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"><a href="http://www.mirlabs.net/ias17/committees.php">http://www.mirlabs.net/ias17/committees.php</a><span></span></span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span lang="EN-US"><br>
For technical contact:<br>
----------------------------------<br>
Ajith Abraham<br>
Email: </span><span lang="EN-US"><a href="mailto:ajith.abraham@ieee.org" target="_blank">ajith.abraham@ieee.org</a></span><span lang="EN-US"><span></span></span></p><div><br></div>-- <br><div class="gmail_signature">Best Regards,<br>Azah Muda</div>
</div>