Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ICITIS 2010 - 2010 IEEE International Conference on Information Theory and Information Security ICITIS 2010

    View: 3384

    Website www.leaderstudio.net | Want to Edit it Edit Freely

    Category ICITIS 2010

    Deadline: August 30, 2010 | Date: December 17, 2010

    Venue/Country: Beijing, China

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    ICITIS2010 aims to provide an international forum for researchers to present and discuss recent advances and novel techniques in information theory and information security. Original, previously unpublished papers and research contributions are invited. Late-breaking results and early stage research are heartily encouraged. Paper submissions will be handled electronically in the ICITIS2010 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2010. All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex and ISTP.
    TOPICS of interest include, but are not limited to, the following:
    Channel and source coding
    Coding theory and practice
    Communication theory and systems
    Emerging applications of information theory
    Information theory and statistics
    Network and multi-user information theory
    Quantum information theory
    Signal processing
    Network coding
    Access control
    Digital right management
    Security and privacy in pervasive/ubiquitous computing
    Accountability economics of security and privacy
    Security in information flow
    Anonymity and pseudonymity
    Electronic frauds
    Security in IT outsourcing
    Applied cryptography
    Authentication
    Identity management
    Security of grid computing
    Information dissemination control
    Computer forensics
    Intrusion detection
    Security of eCommerce
    eBusiness and eGovernment
    Network security
    Information hiding and watermarking
    Security models for ambient intelligence environments
    Database security
    Security modeling and architectures
    Peer-to-peer security
    Trust Models and trust management policies

    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.