ICITIS 2011 - 第二届 IEEE 信息?与信息安全国?会?(ICITIS2011)
View: 8794
Website www.ieccr.net |
Edit Freely
Category Communications; Information Theroy; Information Security; Communication Security
Deadline: July 30, 2011 | Date: November 04, 2011-November 06, 2011
Venue/Country: Hangzhou, China
Updated: 2011-04-22 11:33:11 (GMT+9)
Call For Papers - CFP
ICITIS 20112011 International Conference on Information Theory and Information Security第二届 IEEE 信息?与信息安全国?会?November 4-6, 2011 Hangzhou, China2011 International Conference on Information Theory and Information Security (ICITIS2011) will be held on November 4-6, 2011 in Hangzhou, China. This conference will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.TOPICS of interest include, but are not limited to, the following:Channel and source codingCoding theory and practiceCommunication theory and systemsEmerging applications of information theoryInformation theory and statisticsNetwork and multi-user information theoryQuantum information theorySignal processingNetwork codingAccess controlAccountability economics of security and privacySecurity in information flowAnonymity and pseudonymityElectronic fraudsSecurity in IT outsourcingApplied cryptographyAuthenticationIdentity managementSecurity of grid computingInformation dissemination controlComputer forensicsIntrusion detectionSecurity of eCommerceeBusiness and eGovernmentInformation hiding and watermarkingDigital right managementDatabase securitySecurity modeling and architecturesPeer-to-peer securityTrust Models and trust management policiesSecurity models for ambient intelligence environmentsSecurity and privacy in pervasive/ubiquitous computing
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.