Exploit the possiblities

XCon 2010 XFocus Information Security Conference Call For Papers

XCon 2010 XFocus Information Security Conference Call For Papers
Posted Jun 8, 2010
Site xcon.xfocus.net

Call For Papers for XCon 2010. This conference will take place from August 4th through the 5th in Beijing, China.

tags | paper, conference
MD5 | fde5521de86c0c5c9cb12b73b83a16f1

XCon 2010 XFocus Information Security Conference Call For Papers

Change Mirror Download
XCon 2010 XFocus Information Security Conference Call for Paper

August, 4th - 5th, 2010, Beijing, China (http://xcon.xfocus.net)

Upholding rigorous work style , XCon sincerely welcomes contributions from information security technique enthusiasts and expects your participation and sharing.

Attenders
Anyone who loves information security, including information security experts and fans, network administrators, network security consultants, CIO, hacker technique fans.


Location : Beijing kaiyuan Hotel
( http://www.kaiyuanhotels.com/Hotel/Default.aspx?City=PEK&HotelCode=KYBJGH )


Topics Range (but unlimited):
--- Security in new fields
- Vista / Windows
- Web 2.0
- 3G/4G network
- Mobile Handset (Symbian / IPhone / Android / Windows Mobile )
- Banks & Financial institutes
- Business Information System
- Virtualization
- New bug digging

--- Application security
- Web application vulnerability research
- Application reverse engineering and related automated tools
- Database security & attacks
- Protocol security & exploitation
- Advanced Trojans, worms and backdoor technique
- Encryption & decryption technique
- Routing device

--- Intrusion detection/forensics analysis
- File system analysis & recovery
- Real-time data structure recovery
- Reverse engineering (malicious code analysis technique, vulnerability research)
- Intrusion detection and anti-detection technique
- Traffic analysis

--- Wireless & VoIP security
- 802.11x, CDPD, Bluetooth, WAP/TDMA, GSM, SMS
- PDA & mobile protocol analysis
- Palm, Pocket Pc
- Wireless gateway
- VoIP security & vulnerability analysis
- WLANs hardening & vulnerability analysis

---P2P technique
- Instant messenger (MSN, Skype, ICQ, etc.)
- P2P application (BT, Emule, Thunder, online multi-media, etc.)


Paper Submission:
The papers need include informations as follow:
1) Brief introduction to the topic and whether the topic had been publicized, and if so, the publicized range.
2) Introduction to yourself .
3) Contact information: full name, alias, nationality, network nickname, e-mail, tel., fax, current working place and company, IM (QQ,MSN, ICQ,YM, AIM or others).
4) Presentation details:
- How long is the presentation
- If any new tool/vulnerability/Exploit code will be released
5) The paper need include both PPT (for presentation) and WORD (for detailed description) in MS Office or OpenOffice format.

All the papers will be submitted to cfp@huayongxingan.com for preliminary selection.
The deadline for submission is on July, first , 2010, and the deadline for confirmation is on July, 10th, 2010 .
No matter if the paper is accepted, we will officially inform you within 5 work days.


Important dates
* Deadline for submission : July, First , 2010
* Deadline for confirmation : July, 10th, 2010


Speakers' privilege
If your paper is accepted by XCon, you will be invited to give an individual lecture in XCon. The speakers will be provided with :
- Round-trip plane ticket (Economy class, one person only, Foreign speakers up to $1,200 .)
- Two days' food and accommodation
- Invitation to celebration party
- Sightseeing some famous places of interestes in Beijing, tasting Chinese flavored food
- Luck draw
PS:
- Speakers must provide corresponding invoice or credential.
- XCon owns the right of final explanation about the conference.


For more information about the conference, please contact xcon@xfocus.org, xcon@huayongxingan.com or
professional XCon2010 organizer. MSN: xfocusxcon@hotmail.com; tel : 086-010-62029792


Application for Attending:
In order to attend the conference, please register at XCon website (http://xcon.xfocus.net) or directly contact the organizer mentioned above.
We will offer different discounts according to the time of application.
Attenders' food and accommodation will be covered by themselves, and XCon will provide restaurant reservation and other service.


Other information :
All the information about XCon will be released on XCon and Xfocus website.
Please visit http://xcon.xfocus.org/ for more information about speakers, agenda and previous XCon documents.


Thank you for your support to XCon.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close