ICITIS 2011 - 2011 IEEE International Conference on Information Theory and Information Security
View: 1985
Website www.leaderstudio.net |
Edit Freely
Category ICITIS 2011
Deadline: March 26, 2011 | Date: November 04, 2011-November 06, 2011
Venue/Country: Hangzhou, China
Updated: 2010-12-24 16:32:11 (GMT+9)
Call For Papers - CFP
SponsorsIEEE Beijing Section Zhejiang University of TechnologyBeijing University of Posts and TelecommunicationsChinese Institute of ElectronicsNatural Science Foundation of ChinaOrganizerInformation Security Center, Beijing University of Posts and TelecommunicationsZhejiang Provincial Key Laboratory of Fiber OpticCommunication Technology2011IEEE International Conference on Information Theory and Information Security (ICITIS2011) will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.Selected best papers will be expanded and revised, as required, for the Journal Special Issues of 《China Communications(indexed by SCIE).TOPICS of interest include, but are not limited to:Channel and source codingCommunication theory and systemsInformation theory and statisticsQuantum information theoryNetwork codingAccountability economics of security and privacyAnonymity and pseudonymitySecurity in IT outsourcingAuthenticationSecurity of grid computingComputer forensicsSecurity of eCommerceInformation hiding and watermarkingDatabase securityPeer-to-peer securitySecurity models for ambient intelligence environmentsCoding theory and practiceEmerging applications of information theoryNetwork and multi-user information theorySignal processingAccess controlSecurity in information flowElectronic fraudsApplied cryptographyIdentity managementInformation dissemination controlIntrusion detectioneBusiness and eGovernmentDigital right managementSecurity modeling and architecturesTrust models and trust management policiesSecurity and privacy in pervasive/ubiquitous computingCONTACT INFORMATIONWebsite: http://www.leaderstudio.net/
Email: icitis2011
leaderstudio.net
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.