| |||||||||||||||
ICNIS 2014 : 2014 International conference on Networks and Information Security | |||||||||||||||
Link: http://www.icnis.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
2014 International conference on Networks and Information Security
(ICNIS 2014) Beijing, China Oct. 24-26, 2014 http://www.icnis.org/ The papers accepted by ICNIS 2014 will be published in Journal of Advances in Computer Networks (JACN; ISSN: 1793-8244), which will be included in Engineering & Technology Digital Library, EBSCO, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar. Access control Anti-malware Anonymity Applied cryptography Authentication and authorization Biometric security Data and system integrity Database security Distributed systems security Electronic commerce Fraud control Grid security Information hiding and watermarking Intellectual property protection Intrusion detection Key management and key recovery Language-based security Operating system security Network security Risk evaluation and security certification Security for mobile computing Security models Security protocols Trusted computing Computer Networks Computer Networking Mobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks Radio Wave Propagation (modelling, channel measurements and characterisation) Software Defined Radio Application of FPGA and DSP in Communication Devices and Networks Ad-hoc Networks Signal Processing for Wireless Communications Modulation, Coding and Multiple Access Schemes in Communications Internet and Intranet Technologies and Services Intelligent Spatial and Co-located Data Access and Management Information Theory and Coding Theory Networking Theory and Technologies Antennas Simulation, Design, Measurements and Applications Microwave (RF) System Simulations, Design, Build and Measurements Network and Data Security Hardware and Software Applications Communication Protocols and Standards University-Industry Collaboration or Knowledge Transfer Activities Network Architecture Network Interfaces Network Reliability Network Performance Network Management Network protocols Quality Service Issues Wireless Protocol, Architecture and Design Concerns Adhoc Networks Heterogeneous Networks High Performance Network Protocol Services and Interconnection of High Speed Networks Methodologies and development for high speed Network Performance in High Speed Network VoIP Blue tooth Technology Broadband Access Control Wireless Access Control Security Issues Cryptography Network Security Wireless Network Security Information Hiding, Stegnography, Watermarking Security in High speed network Biometrics Identification and trust Methodology Forensic Peer to Peer Security Network intrusion, detection and prevention via: icnis@iacsit.net (.pdf/.doc) Ms. Joice Deng, Tel: +86-28-8652-7868 E-mail: icnis@iacsit.net |
|