| |||||||||||||||
ICNIS 2015 : 2015 2nd International conference on Networks and Information Security | |||||||||||||||
Link: http://www.icnis.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
2015 2nd International conference on Networks and Information Security (ICNIS 2015)
Date: Oct. 23-25, 2015 Venue: Singapore http://www.icnis.org/ Topics: Communications, Information and Network Security Access control Anti-malware Anonymity Applied cryptography Authentication and authorization Biometric security Data and system integrity Database security Distributed systems security Electronic commerce Fraud control Grid security Information hiding and watermarking Intellectual property protection Intrusion detection Key management and key recovery Language-based security Operating system security Network security Risk evaluation and security certification Security for mobile computing Security models Security protocols Trusted computing Computer Networks Computer Networking Mobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks Radio Wave Propagation (modelling, channel measurements and characterisation) Software Defined Radio Application of FPGA and DSP in Communication Devices and Networks Ad-hoc Networks Signal Processing for Wireless Communications Modulation, Coding and Multiple Access Schemes in Communications Internet and Intranet Technologies and Services Intelligent Spatial and Co-located Data Access and Management Information Theory and Coding Theory Networking Theory and Technologies Antennas Simulation, Design, Measurements and Applications Microwave (RF) System Simulations, Design, Build and Measurements Network and Data Security Hardware and Software Applications Communication Protocols and Standards University-Industry Collaboration or Knowledge Transfer Activities Network Architecture Network Interfaces Network Reliability Network Performance Network Management Network protocols Quality Service Issues Wireless Protocol, Architecture and Design Concerns Adhoc Networks Heterogeneous Networks High Performance Network Protocol Services and Interconnection of High Speed Networks Methodologies and development for high speed Network Performance in High Speed Network VoIP Blue tooth Technology Broadband Access Control Wireless Access Control Security Issues Cryptography Network Security Wireless Network Security Information Hiding, Stegnography, Watermarking Security in High speed network Biometrics Identification and trust Methodology Forensic Peer to Peer Security Network intrusion, detection and prevention For more topics: http://www.icnis.org/cfp.html Publication: Accepted papers will be published in the one of the following Journals with ISSN. * Journal of Advances in Computer Networks (ISSN: 1793-8244) Abstracting/Indexing: Engineering & Technology Digital Library, EBSCO, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar * Journal of Communications (ISSN: 1796-2021) Abstracting/Indexing: EI Compendex; SCOPUS; ULRICH's Periodicals Directory; Google Scholar; INSPEC; etc Submission Method: Electronic Submission System:http://www.easychair.org/conferences/?conf=icnis2015 E-mail: icnis@asr.org Contact Us: Ms. Cindy Miao Tel: +1-617-229-6820 Email: icnis@asr.org |
|