Author Archives: admin

Conference Begins

Welcome to Niagara Falls! For those of you who have already made it into town, don’t forget about the Power Authority tour starting at 1515 today (meet in hotel lobby 1445); and the reception at the Red Coach Inn starting … Continue reading

Posted in Uncategorized | Comments Off

Conference Room

The conference will be located in the Porter-DeVeaux room of the Conference Center Niagara Falls (See “Venue” for more information)

Posted in Uncategorized | Comments Off

Updated social event information

We’re looking forward to seeing everyone in Niagara! The social event information page has been updated with directions and itineraries. Be sure to come join us for the NY Power Authority Tour and the reception at the Red Coach Inn … Continue reading

Posted in Uncategorized | Comments Off

Final additions

As we enter the final week of preparations, additional conference information has been added to the website. The final invited speaker biography and abstract has been posted, times have been added to the program, and a new section detailing information … Continue reading

Posted in Uncategorized | Comments Off

Conference Information Update

Venue, Hotel and Invited Speaker information for the 13th ACM MM&SEC Workshop has been posted.  Further information, including Registration, is forthcoming.

Posted in Uncategorized | Comments Off

Submission deadline extended

The submission deadline has been extended to June 11, 2011.

Posted in Uncategorized | Comments Off

Submissions are Open

You can log in to the CMT submissions system to upload your paper at https://cmt.research.microsoft.com/MMSEC2011/Default.aspx. As stated in the call for papers, templates for the ACM SIG proceedings can be found at http://www.acm.org/sigs/publications/proceedings-templates.

Posted in Uncategorized | Comments Off

Call For Papers

The 13th ACM Multimedia and Security Workshop will be held in Buffalo NY.  The workshop’s continuing objective is to explore research in areas of multimedia data security such as data protection, media forensics, covert channels and security issues in biometrics, … Continue reading

Posted in Uncategorized | Comments Off