第二届IEEE信息论与信息安全国际会议(ICITIS 2011) |
|
第二届IEEE信息论与信息安全国际会议(ICITIS 2011) |
|
作者:佚名 文章来源:不详 点击数: 更新时间:2011-1-8 18:21:04 |
第二届IEEE信息论与信息安全国际会议(ICITIS 2011)
2011年11月4-6日,中国杭州
Sponsor
IEEE北京分会
浙江工业大学
北京邮电大学
中国电子学会
国家自然科学基金委员会 |
Organizer
北京邮电大学信息安全中心
浙江省光纤重点实验室 |
第二届IEEE信息论与信息安全国际 会议(ICITIS 2011)将于2011年11月4日-6日在杭州召开(EnPapers 论文翻译、英文论文修改、SCI论文润色)。ICITIS2011将为全球计算机科学与信息安全研究人员和实际工作者交流新技术、新成果、新经验提供一个广阔的平台(EnPapers 论文翻译、 英文论文修改、SCI论文润色)。本次 会议论文集将被 Ei和ISTP检索,并进入IEEE Xplore(EnPapers 论文翻译、英文论文修改、SCI论文润色)。优秀论文将推荐至《China communication》(SCIE检索)(EnPapers 论文翻译、英文论文修改、SCI论文润色)。
征文要求:只接受英文稿件,所有投稿需为原创首发(EnPapers 论文翻译、 英文论文修改、SCI论文润色)。
论文提交截止日期: 2011年7月30日
论文接收通知时间: 2011年8月2日
2011 IEEE International Conference on Information Theory and Information Security
2011 IEEE International Conference on Information Theory and Information Security (ICITIS2011) will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.
Selected best papers will be expanded and revised, as required, for the Journal Special Issues of 《China Communications(indexed by SCIE).
Sponsor
IEEE Beijing Section
Zhejiang University of Technology
Beijing University of Posts and Telecommunications
Chinese Institute of Electronics
Natural Science Foundation of China |
Organizer
Information Security Center, Beijing University of Posts and Telecommunications
Zhejiang Provincial Key Laboratory of Fiber Optic Communication Technology |
TOPICS of interest include, but are not limited to:
· Channel and source coding |
· Coding theory and practice |
· Communication theory and systems |
· Emerging applications of information theory |
· Information theory and statistics |
· Network and multi-user information theory |
· Quantum information theory |
· Signal processing |
· Network coding |
· Access control |
· Accountability economics of security and privacy |
· Security in information flow |
· Anonymity and pseudonymity |
· Electronic frauds |
· Security in IT outsourcing |
· Applied cryptography |
· Authentication |
· Identity management |
· Security of grid computing |
· Information dissemination control |
· Computer forensics |
· Intrusion detection |
· Security of eCommerce |
· eBusiness and eGovernment |
· Information hiding and watermarking |
· Digital right management |
· Database security |
· Security modeling and architectures |
· Peer-to-peer security |
· Trust Models and trust management policies |
· Security models for ambient intelligence environments |
· Security and privacy in pervasive/ubiquitous computing |
IMPORTANT DATES
Acceptance Notification: Apr. 15, 2011
CONTACT INFORMATION
|
文章录入:xiaohe 责任编辑:admin |
|
上一篇文章: 2011年计算机教育、仿真与建模国际研讨会
下一篇文章: 厦门冬季学术会议 |
【字体:小 大】【发表评论】【加入收藏】【告诉好友】【打印此文】【关闭窗口】 |