| |||||||||||||||
ICITST 2011 : The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011) | |||||||||||||||
Link: http://icitst.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011) is Technical Co-sponsored by IEEE UAE Computer Chapter. The ICITST is an international refereed conference dedicated to the advancement of the theory and practical implementation of secured Internet transactions and to fostering discussions on information technology evolution. The ICITST aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry.
The objectives of the ICITST are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2011 invites research papers that encompass conceptual analysis, design implementation and performance evaluation. All the accepted papers will appear in the proceedings published by IEEE and fully indexed by IEEE Xplore. All the ICITST papers are indexed by DBLP. The topics in ICITST-2011 include but are not confined to the following areas: Internet Application and Technology Internet technologies Internet Architecture Internet of things Broadband Access Technologies Application Agents Boundary Issues of Internet Security Database Management Data Models for Production Systems and Services Artificial Intelligence and Expert Systems IPSec Quality of Service Knowledge Management Embedded Systems Defence Systems Infonomics and e-Technology Infonomics Information Visualization Information Management Information Quality Technology-Enabled Information e-Learning e-Commerce e-Business e-Government e-Society System Design and Security for e-Services Synchronizing e-Security Information Security Collaborative Learning Trust, Privacy and Data Security Network Security Issues and Protocols Security Challenges and Content Authoring Cryptography Secure Communications Authentication Techniques Chaos-based Data Security MANET Security Wireless Sensor Network Security Organization Considerations in Security Policy Formulation and Implementations Digital Forensics and Crimes Biometrics Cyber Security Multimedia and Web Services Intelligent Multimedia and its Data Management Multimedia Information Systems Multimedia Security Web Databases Web Metrics and its Applications Web Mining including Web Intelligence and Web 3.0. Web Services XML and other extensible languages Semantic Web and Ontology Ubi/Cloud Computing Authentication and Access Control for Data Protection in Ubi/Cloud Computing Context-Awareness and its Data Mining for UbiCom Data Grids Distributed Information Systems Human-Computer Interface and Interaction for UbiCom Ubiquitous Systems USN/RFID Service Smart Homes and its Business Model for UbiCom Service Security and Data Management for UbiCom Peer to Peer Data Management New Novel Mechanism and Application for Ubi/Cloud Computing Research in Progress Ongoing research from undergraduates, graduates/postgraduates and professionals Projects Collaborative Research Future Technologies |
|