Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ICITIS 2011 - 2011 IEEE International Conference on Information Theory and Information Security

    View: 1987

    Website www.leaderstudio.net | Want to Edit it Edit Freely

    Category ICITIS 2011

    Deadline: March 26, 2011 | Date: November 04, 2011-November 06, 2011

    Venue/Country: Hangzhou, China

    Updated: 2010-12-24 16:32:11 (GMT+9)

    Call For Papers - CFP

    Sponsors

    IEEE Beijing Section

    Zhejiang University of Technology

    Beijing University of Posts and Telecommunications

    Chinese Institute of Electronics

    Natural Science Foundation of China

    Organizer

    Information Security Center, Beijing University of Posts and Telecommunications

    Zhejiang Provincial Key Laboratory of Fiber OpticCommunication Technology

    2011IEEE International Conference on Information Theory and Information Security (ICITIS2011) will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.

    Selected best papers will be expanded and revised, as required, for the Journal Special Issues of 《China Communications(indexed by SCIE).

    TOPICS of interest include, but are not limited to:

    Channel and source coding

    Communication theory and systems

    Information theory and statistics

    Quantum information theory

    Network coding

    Accountability economics of security and privacyAnonymity and pseudonymity

    Security in IT outsourcing

    AuthenticationSecurity of grid computing

    Computer forensics

    Security of eCommerce

    Information hiding and watermarking

    Database securityPeer-to-peer security

    Security models for ambient intelligence environments

    Coding theory and practice

    Emerging applications of information theory

    Network and multi-user information theory

    Signal processing

    Access controlSecurity in information flow

    Electronic fraudsApplied cryptographyIdentity management

    Information dissemination controlIntrusion detectione

    Business and eGovernment

    Digital right management

    Security modeling and architectures

    Trust models and trust management policies

    Security and privacy in pervasive/ubiquitous computing

    CONTACT INFORMATION

    Website: http://www.leaderstudio.net/

    Email: icitis2011atleaderstudio.net


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.