Data, Privacy, & E-Commerce

Accepted Papers

  • k-NN Numeric Prediction Using Bagging and Instance-relevant Combination (Liang He, Qinbao Song and Junyi Shen, Xi'an Jiaotong University, China)
  • Ontology-Enhanced Interactive Anonymization in Domain-Driven Data Mining Outsourcing (Brian Loh and Patrick Then, Swinburne University of Technology, Malaysia)
  • A Comprehensive Quality Evaluation System for Coordinate Transformation (Hui Li and Cheng Zhong, China University of Geoscience, China; Wuhan Urban Planning Information Center, China)
  • Pseudonym-based RFID Discovery Service to Mitigate Unauthorized Tracking in Supply Chain Management (Qiang Yan, Robert H. Deng, Zheng Yan, Yingjiu Li and Tieyan Li, Singapore Management University, Singapore; Nokia Research Center, Finland; A*Star, Singapore)
  • An efficient Dynamic Identity-Based Broadcast Encryption scheme (Han Jiang, Jiuqing Shang and Qiuliang Xu, Shan Dong University, China)
  • A Provable Security Biometric Password Multi-server Authentication Scheme with Smart Card (Dexin Yang and Yang Bo, South China Agricultural University, China)
  • Improving Applicability, Efficiency And Security Of Non-Membership Proof (Kun Peng and Feng Bao, A-Star, Singapore)
  • A face based fuzzy vault scheme for secure online authentication (Lifang Wu and Songlong Yuan, Beijing University of Technology, China)
  • An E-payment System Based on Quantum Blind and Group Signature (Xiaojun Wen, Shenzhen Polytechnic, China)
  • A Security Enhanced Remote Password Authentication Scheme using Smart Card (Zhuo Hao and Nenghai Yu, University of Science and Technology of China, China; SUNY Buffalo, USA)
  • DCT Transform based Relational Database Robust Watermarking Algorithm (Yige Song, Weidong Liu, Jiaxing Song and Ming Sze Angela Wong, Tsinghua University, China)
  • Some Improvements on Model Checking CoreASM Models of Security Protocols (Zhenju Zhao, Feng Liu, Jianhua Peng, Danqing Huang, Rui Xue and Zhenfeng Zhang, Chinese Academy of Sciences, China)
  • Taking the Tags With You: Digital Photograph Provenance (Brandeis Marshall, Purdue University, USA)
  • Towards A Flexible Spatially Aware Access Control Model (Desheng Zhang, Min Zhang and Chi Chen, Chinese Academy of Sciences, China)  
  • A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability (Zhuo Hao and Nenghai Yu, University of Science and Technology of China, China; SUNY Buffalo, USA)
  • Improve Music Teaching Quality throughout Using Information Technology (Yue Ji, SUNY Buffalo, USA)
  • Performance Analysis of MIMO Relaying Channels’ Cooperative Diversity for Mobile Networks (Nafis Imtiaz Zaman, Kazi Md Abdullah Al Mamun, Triantafyllos Kanakis and Abu Salah Uddin, University of Greenwich, UK; Yeungnam University, Korea)
  • TOWARDS TRANSACTIONAL DATA MANAGEMENT OVER THE CLOUD (Rohan Tiwari, Shamkant Navathe and Gaurav Kulkarni, Georgia Institute of Technology, USA)
  • A Model for Evaluating Technological Innovation Ability In E-commerce Based on Information Entropy and Unascertained Measure (RongRong Ren and Xing Gang, Northeastern University at Qinhuangdao, China)
  • Design and Development of Real-Time Communication Content Management System for E-Commerce (Pilunchana Kiatruangkrai, Poomipat Phusayangkul, Supanut Viniyakul, Nakornthip Prompoon and Pizzanu Kanongchaiyos, Chulalongkorn University, Thailand)
  • Verification of Privacy Requirements in Web Services Composition (Liu Linyuan and Huang Zhiqiu, Nanjing University of Aeronautics and Astronautics, China)

ISDPE2010 Call for Papers

(EI indexed; Technically sponsored by IEEE computer society)  

The Second International Symposium on Data processing, Privacy, and E-commerce (ISDPE 2010) is an international conference  technically sponsored by the IEEE computer society, covering the research of data processing, data privacy, and electronic commerce. The aim of ISDPE 2010 is to bring together computer scientists and electrical engineers in all the related areas under one roof, such that the interactions among the experts of these areas can be promoted and new interdisciplinary technologies can be developed.  

The ISDPE2010 conference seeks submissions of research papers reporting original investigation results related to data processing, data privacy and electronic commerce, as well as industrial papers reporting their applications. Position papers and work-in-progress papers will also be considered. Please indicate clearly on your submission which category it belongs to. The topics of the papers will include but are not limited to the following:

  • Data Processing:

Database techniques
Data pre-processing and post-processing
Data integration
Online transactions processing
Data mining algorithms

  • Data Privacy:

Data Integrity
Access control
Network security
Key management
Intrusion detection
Security management
Database security

  • E-Commerces:

Automated shopping and trading
Computational economics
Information markets
Payment and exchange protocols
Reputation and trust systems

Important Dates:

Paper Submission (extended): 11:59pm PDT, May 8, 2010
Notification of Acceptance: June 5, 2010
submission of final version and author registration deadline: July 5, 2010
Conference: September 13-14, 2010

Paper Submission:

Submissions are to be made to the submission website.

All papers must be submitted electronically, in PDF or PS format. Submitted papers must not have any significant overlap with published papers or submissions to other journals or conferences. Submissions should be at most 6 pages(8.5" x 11", Two-Column Format). Please see the formatting instruction for details.

Note that the proceedings will be completely included in the IEEE Xplore digital library, and indexed by EI.

Author Kit for Accepted Papers

The following is a URL link to the "Author's Final Paper Formatting and Submission Instructions" Webpage (Online Author Kit) for 2010 Second International Symposium on Data, Privacy, and E-Commerce (ISDPE 2010):


Sponsorship Info...


SUNY Buffalo

Technical Co-Sponsor:

IEEE logo

Technically Co-Sponsored IEEE Computer Society