ICCINS 2012 - International Conference on Communications, Information and Network Security (ICCINS 2012)
Topics/Call fo Papers
The VIII. International Conferen 192 ce on Communications, Information and Network Security is the premier forum for the presentation of new advances and research results in the fields of Communications, Information and Network Security. The conference will bring together leading researchers, engineers and scientists in the domain of i 19e nterest from around the world. Topics of interest for submission include, but are not limited to:
Communications, Information and Network Security
Access control
Anti-malware
Anonymity
Applied cryptography
Authentication and authorization
Biometric security
Data and system integrity
Da 19d tabase security
Distributed systems security
Electronic commerce
Fraud control
Grid security
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management and key recovery
Language-based security
Operating system security
Network security
Risk evaluation and security certification
Security for mobile 19d computing
Security models
Security protocols
Trusted computing
Computer Networks
Computer Networking
Mobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks
Radio Wave Propagation (modelling, channel measurements and characterisation)
Software Defined Radio
Application of FPGA and DSP in Communication Devices and Networks
Ad-hoc Ne 198 tworks
Signal Processing for Wireless Communications
Modulation, Coding and Multiple Access Schemes in Communications
Internet and Intranet Technologies and Services
Intelligent Spatial and Co-located Data Access and Management
Information Theory and Coding Theory
Networking Theory and Technologies
Antennas Simulation, Design, Measurements and Applications
Microwa 19b ve (RF) System Simulations, Design, Build and Measurements
Network and Data Security
Hardware and Software Applications
Communication Protocols and Standards
University-Industry Collaboration or Knowledge Transfer Activities
Network Architecture
Network Interfaces
Network Reliability
Network Performance
Network Management
Network protocols
Quality Serv 19c ice Issues
Wireless Protocol, Architecture and Design Concerns
Adhoc Networks
Heterogeneous Networks
High Performance Network Protocol
Services and Interconnection of High Speed Networks
Methodologies and development for high speed Network
Performance in High Speed Network
VoIP Blue tooth Technology
Broadband Access Control
Wireless Access Control
1a3 Security Issues
Cryptography
Network Security
Wireless Network Security
Information Hiding, Stegnography, Watermarking
Security in High speed network
Biometrics
Identification and trust Methodology
Forensic
Peer to Peer Security
Network intrusion, detection and prevention Contact us: info-AT-waset.org
Communications, Information and Network Security
Access control
Anti-malware
Anonymity
Applied cryptography
Authentication and authorization
Biometric security
Data and system integrity
Da 19d tabase security
Distributed systems security
Electronic commerce
Fraud control
Grid security
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management and key recovery
Language-based security
Operating system security
Network security
Risk evaluation and security certification
Security for mobile 19d computing
Security models
Security protocols
Trusted computing
Computer Networks
Computer Networking
Mobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks
Radio Wave Propagation (modelling, channel measurements and characterisation)
Software Defined Radio
Application of FPGA and DSP in Communication Devices and Networks
Ad-hoc Ne 198 tworks
Signal Processing for Wireless Communications
Modulation, Coding and Multiple Access Schemes in Communications
Internet and Intranet Technologies and Services
Intelligent Spatial and Co-located Data Access and Management
Information Theory and Coding Theory
Networking Theory and Technologies
Antennas Simulation, Design, Measurements and Applications
Microwa 19b ve (RF) System Simulations, Design, Build and Measurements
Network and Data Security
Hardware and Software Applications
Communication Protocols and Standards
University-Industry Collaboration or Knowledge Transfer Activities
Network Architecture
Network Interfaces
Network Reliability
Network Performance
Network Management
Network protocols
Quality Serv 19c ice Issues
Wireless Protocol, Architecture and Design Concerns
Adhoc Networks
Heterogeneous Networks
High Performance Network Protocol
Services and Interconnection of High Speed Networks
Methodologies and development for high speed Network
Performance in High Speed Network
VoIP Blue tooth Technology
Broadband Access Control
Wireless Access Control
1a3 Security Issues
Cryptography
Network Security
Wireless Network Security
Information Hiding, Stegnography, Watermarking
Security in High speed network
Biometrics
Identification and trust Methodology
Forensic
Peer to Peer Security
Network intrusion, detection and prevention Contact us: info-AT-waset.org
Other CFPs
- International Conference on Animal and Veterinary Sciences (ICAVS 2012)
- International Conference on Fisheries and Aquatic Sciences (ICFAS 2012)
- International Conference on Animal Science and Veterinary Medicine (ICASVM 2012)
- International Conference on Agricultural, Biotechnology, Biological and Biosystems Engineering (ICABBBE 2012)
- International Conference on Environmental, Biological, and Ecological Sciences, and Engineering (ICEBESE 2012)
Last modified: 2011-06-29 14:45:50