ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICCNS 2012 - International Conference on Computer Networks and Security (ICCNS 2012)

Date2012-07-11

Deadline2012-02-29

VenueBa rcelona, Spain Spain

Keywords

Websitehttps://www.waset.org/events.php

Topics/Call fo Papers

The VIII. International Conferen 194 ce on Computer Networks and Security is the premier forum for the presentation of new advances and research results in the fields of Computer Networks and Security. The conference will bring together leading researchers, engineers and scientists in the domain of interest f 199 rom around the world. Topics of interest for submission include, but are not limited to:

Computer Networks
Computer Networking
Mobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks
Radio Wave Propagation (modelling, channel measurements and characterisation)
Software Defined Radio
Application of FP 197 GA and DSP in Communication Devices and Networks
Ad-hoc Networks
Signal Processing for Wireless Communications
Modulation, Coding and Multiple Access Schemes in Communications
Internet and Intranet Technologies and Services
Intelligent Spatial and Co-located Data Access and Management
Information Theory and Coding Theory
Networking Theory and Technolog 199 ies
Antennas Simulation, Design, Measurements and Applications
Microwave (RF) System Simulations, Design, Build and Measurements
Network and Data Security
Hardware and Software Applications
Communication Protocols and Standards
University-Industry Collaboration or Knowledge Transfer Activities
Network Architecture
Network Interfaces
Network 19b Reliability
Network Performance
Network Management
Network protocols
Quality Service Issues
Wireless Protocol, Architecture and Design Concerns
Adhoc Networks
Heterogeneous Networks
High Performance Network Protocol
Services and Interconnection of High Speed Networks
Methodologies and development for high speed Network
Performa 19f nce in High Speed Network
VoIP Blue tooth Technology
Broadband Access Control
Wireless Access Control

Security Issues
Cryptography
Network Security
Wireless Network Security
Information Hiding, Stegnography, Watermarking
Security in High speed network
Biometrics
Identification and trust Methodology
Forensic 1a5
Peer to Peer Security
Network intrusion, detection and prevention Contact us: info-AT-waset.org

Last modified: 2011-06-29 13:56:03