ASID 2011 - 2011 International Conference on Anti-Counterfeiting, Security and Identification (2011 ASID)
View: 2555
Website fjic.xmu.edu.cn/ASID/ |
Edit Freely
Category ASID 2011
Deadline: January 17, 2011 | Date: June 24, 2011-June 26, 2011
Venue/Country: Xiamen, China
Updated: 2011-01-05 17:12:35 (GMT+9)
Call For Papers - CFP
International Conference on Anti-counterfeiting, Security, and Identification(2011ASID)Jun.2011Xiamen, ChinaGeneral InformationThis conference (the fifth International Conference on Anti -counterfeiting, Security, and Identification) will provide a unique forum for researchers, engineers and educators interested in live demonstrations describing novel work on systems, applications and services of the Internet reaching out into the real world of physical objects. Also, this conference aims to bring together researchers and practitioners that work on problems related to RFID and Antenna, IC Design and System Integration, Wireless Communication and Network Security, Cryptographic Algorithm and Hardware Implementation, Anti-counterfeiting and Identification, as well as Information Management and Industry Polices. The conference, to be held on Jun. , 2011 in Xiamen, China, is co-organized by IEEE Beijing Section. The conference proceedings including all the accepted papers will be published by IEEE and indexed in EI.SchedulePaper Submission Deadline15 JAN,2011Notification of Acceptance15 MAR ,2011Camera-ready Copy20 APR ,2011TopicsConference topics include, but are not limited to: Internet of Things (IoT):Green by IoT / Green of IoT Technology,Design of future sustainable technologies linking the physical and virtual world,Novel services and applications to facilitate environmental responsibility,Emerging IoT business models and process changes,Communication systems and network architectures for the IoT ,Experience reports from the introduction and operation of networked things in areas such as healthcare, logistics & transport, Emerging applications and interaction paradigms for everyday citizens, Social impacts and consequences, such as security, privacy, opportunities and risks.RFID Techniques and applications: RFID Technology, Artificial intelligence system, Intelligent electronics, Smart card and Intelligence card reader, Digital rights management.IC Design and System Integration: IC Design method , RF-IC and Mixture IC, MCM, Embedded System.EMC Theory and applications: EMC in Communication, Wireless EMC, EMC sensing and Identification, Satellite security EMC, Antenna design.Pattern recognition and applications: Pattern recognition method, Digital identification.Cryptograph standards and management: Security standards activities, Trust model and management, Usability aspects of information security systems, Cryptographic algorithm and realization on hardware , Risk evaluation and security certification.Wireless communication and Networking engineering: Wireless secure communication, Critical infrastructure protection, Internet Technology and Applications, Network modeling and performance analysis.Next Generation Networking and IPv6: Network architecture for NGN, Technologies of broadband access networks, New IPv6-based services and applications.Information Management and polices: Information Security Management, Standards and best practices for managing information and systems security.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.