posted by system || 15269 views || tracked by 42 users: [display]

ICITIS 2010 : IEEE International Conference on Information Theory and Information Security

FacebookTwitterLinkedInGoogle

Link: http://www.leaderstudio.net/icitis
 
When Dec 17, 2010 - Dec 19, 2010
Where Beijing, China
Submission Deadline Sep 10, 2010
Notification Due Sep 30, 2010
Final Version Due Nov 30, 2010
Categories    information theory   security
 

Call For Papers

ICITIS2010 aims to provide an international forum for researchers to present and discuss recent advances and new techniques in information theory and information security. Original, previously unpublished papers and research contributions are invited. Late-breaking results and early stage research are heartily encouraged. Paper submissions will be handled electronically in the ICITIS2010 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2010. All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex and ISTP.

The scope includes, but not limited to:
# Channel and source coding
# Coding theory and practice
# Communication theory and systems
# Emerging applications of information theory
# Information theory and statistics
# Network and multi-user information theory
# Quantum information theory
# Signal processing
# Network coding
# Access control
# Digital right management
# Security and privacy in pervasive/ubiquitous computing
# Accountability economics of security and privacy
# Security in information flow
# Anonymity and pseudonymity
# Electronic frauds
# Security in IT outsourcing
# Applied cryptography
# Authentication
# Identity management
# Security of grid computing
# Information dissemination control
# Computer forensics
# Intrusion detection
# Security of eCommerce
# eBusiness and eGovernment
# Network security
# Information hiding and watermarking
# Security models for ambient intelligence environments
# Database security
# Security modeling and architectures
# Peer-to-peer security
# Trust Models and trust management policies

Related Resources

ICONIP 2021   The 28th International Conference on Neural Information Processing (ICONIP2021)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ICCIS--IEEE, Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2020)--Ei Compendex, Scopus
IJCIS 2021   International Journal on Cryptography and Information Security
IEEE--ICCIS--Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2020)--Ei Compendex, Scopus
IJCCSA 2021   International Journal on Cloud Computing: Services and Architecture
ICCIS--IEEE, Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2021)--Ei Compendex, Scopus
SPTM 2021   9th International Conference of Security, Privacy and Trust Management
CRITIS 2021   The 16th International Conference on Critical Information Infrastructures Security
IEEE--ICCIS--Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2021)--Ei Compendex, Scopus