Conference Chair

Technical Program Committee

  • The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), December 14-16, 2015, London, UK.
  • The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), December 8-10, 2014, London, UK.
  • The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), December 9-12, 2013, London, UK.
  • The 20th International Conference on Parallel and Distributed System (ICPADS'14), December 16-19, 2014, Hsinchu, Taiwan.
  • The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia), November 27, 2013, Guangzhou, China.
  • The International Workshop on Secure Cloud Computing (SCC 2013), September 9-11, 2013, Xi'an, China.
  • The 3rd International Conference on Communications and Mobile Computing (CMC 2011), August 18-20, 2011, Qingdao, Shandong, China.
  • The 2nd International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE 2010), October 12, 2010, Niagara Falls, Ontario, Canada.
  • The 8th Annual Conference on Privacy, Security and Trust (PST 2010), August 17-19, 2010, Ottawa, Ontario, Canada.

Journal Reviewing

  • IEEE Transactions on Computers
  • IEEE Transactions on Information Forensics and Security
  • IEEE Transactions on Dependable and Secure Computing
  • IEEE Transactions on Wireless Communications
  • IEEE Transaction on Vehicular Technology
  • Journal of Cryptographic Engineering
  • Designs, Codes and Cryptography
  • LNCS Transactions on Computational Science
  • Computers and Mathematics with Applications
  • Journal of Computational and Applied Mathematics
  • KSII Transactions on Internet and Information Systems
  • International Journal of Distributed Sensor Networks
  • EURASIP Journal on Information Security
  • Design Automation for Embedded Systems
  • Information Processing Letters
  • Information Sciences
  • Journal of Sensors
  • ETRI Journal
  • PLOS ONE
  • Sensors

Conference and Workshop Reviewing

  • The 2014 IEEE Conference on Communications and Network Security (CNS 2014)
  • The 2014 IEEE Symposium on Industrial Electronics Applications (ISIEA 2014)
  • The 21th International Conference on Selected Areas in Cryptography (SAC 2014)
  • The 19th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2013)
  • The 20th International Conference on Selected Areas in Cryptography (SAC 2013)
  • The 11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
  • The 2013 Workshop on RFID and IoT Security (RFIDSec'13 Asia)
  • The International Workshop on Secure Cloud Computing (SCC 2013)
  • The 19th International Conference on Selected Areas in Cryptography (SAC 2012)
  • The 19th International Workshop on Fast Software Encryption (FSE 2012)
  • The 14th International Conference on Information Security (ISC 2011)
  • The 3rd International Workshop on the Arithmetic of Finite Fields (WAIFI 2010)
  • The 10th International Conference on Cryptology in India (INDOCRYPT 2009)
  • The 7th International Conference on Cryptology in India (INDOCRYPT 2006)
  • The 11th International Conference on Information Security and Cryptology (ICISC 2008)
  • The 5th Information Security Practice and Experience Conference (ISPEC 2009)
  • The 4th Information Security Practice and Experience Conference (ISPEC 2008)
  • The 2012 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE 2012)
  • The 7th International Symposium on Turbo Codes & Iterative Information Processing (ISTC 2012)
  • The 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011)
  • IEEE GLOBECOM 2011 - Wireless Communications Symposium
  • The 8th Annual Conference on Privacy, Security and Trust (PST 2010)