Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ICITIS 2011 - 第二届 IEEE 信息?与信息安全国?会?(ICITIS2011)

    View: 8796

    Website www.ieccr.net | Want to Edit it Edit Freely

    Category Communications; Information Theroy; Information Security; Communication Security

    Deadline: July 30, 2011 | Date: November 04, 2011-November 06, 2011

    Venue/Country: Hangzhou, China

    Updated: 2011-04-22 11:33:11 (GMT+9)

    Call For Papers - CFP

    ICITIS 2011

    2011 International Conference on Information Theory and Information Security

    第二届 IEEE 信息?与信息安全国?会?

    November 4-6, 2011 Hangzhou, China

    2011 International Conference on Information Theory and Information Security (ICITIS2011) will be held on November 4-6, 2011 in Hangzhou, China. This conference will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.

    TOPICS of interest include, but are not limited to, the following:

    Channel and source coding

    Coding theory and practice

    Communication theory and systems

    Emerging applications of information theory

    Information theory and statistics

    Network and multi-user information theory

    Quantum information theory

    Signal processing

    Network coding

    Access control

    Accountability economics of security and privacy

    Security in information flow

    Anonymity and pseudonymity

    Electronic frauds

    Security in IT outsourcing

    Applied cryptography

    Authentication

    Identity management

    Security of grid computing

    Information dissemination control

    Computer forensics

    Intrusion detection

    Security of eCommerce

    eBusiness and eGovernment

    Information hiding and watermarking

    Digital right management

    Database security

    Security modeling and architectures

    Peer-to-peer security

    Trust Models and trust management policies

    Security models for ambient intelligence environments

    Security and privacy in pervasive/ubiquitous computing


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.