IJCAES-CNS 2011 - Special Issue on Computer Networks & Security (IJCAES)
Date2011-07-31
Deadline2011-07-25
VenueGangtok, India
KeywordsComputer Network; Network Security; Information Security
Topics/Call fo Papers
IJCAES is inviting research papers, review articles and tutorials from the following research areas of for its special issue on Computer Network & Security (but not limited to):
Computer Networks:
3G/4G Network Evolutions
Adhoc and Sensor networks
Agent Computings & Multi-Agents Systems
CDMA/GSM Communication Protocols
Heterogeneous wireless networks
High speed networks
Internet and Web applications
Measurement & Performance Analysis
Mobile & Broadband Wireless Internet
Mobile Computing for e-Commerces
Mobile networks & Wireless LAN
Network Architectures
Network Based applications
Network Operations & management
Network Protocols & Wireless Networks
Next Generation Internet
Next Generation Web Architectures
Optical Networking
Peer to peer and overlay networks
QoS and Resource Management
Quality of Services and Communication Protocols
Recent trends & Developments in Computer Networks
Routing, switching and addressing techniques
Satelite and Optical Communication Systems
Self-Organizing Networks and Networked Systems
Ubiquitous networks
Wireless communications
Wireless Multimedia systems
Network & Information Security:
Authentication/Authorization Issues
Cryptographic Implementations
Cryptographic protocols
Cryptography and Foundation of Computer Security
Database and System Security
E-mail security, Spam, Phishing, E-mail fraud
IC-card Security, OTP, and Key Management Issues
IDS/Firewall, Anti-Spam mail, Anti-virus issues
Internet Security & Applications
Intrusion Detection and Prevention
Mobile, Ad Hoc and Sensor Network Security
Network and Wireless Network Security
Peer-to-Peer Network Security
Performance Evaluations of Protocols & Security Application
Security & Network Management
Security Issues in Adhoc and Mesh Networks
Security Issues in Complex Networks
Security threats & countermeasures
Ubiquitous Computing Security
Virus, worms, Trojon Protection
Web 2.0 security
Paper Submission Opens: 1st July 2011
Paper Submission Closes: 25th July 2011
Acceptance Notification: After 7 working days from the date of Submission
Online Publication: Immediately after completion of all necessary formalities
Printed Copy: Will be released on 10th August 2011
Computer Networks:
3G/4G Network Evolutions
Adhoc and Sensor networks
Agent Computings & Multi-Agents Systems
CDMA/GSM Communication Protocols
Heterogeneous wireless networks
High speed networks
Internet and Web applications
Measurement & Performance Analysis
Mobile & Broadband Wireless Internet
Mobile Computing for e-Commerces
Mobile networks & Wireless LAN
Network Architectures
Network Based applications
Network Operations & management
Network Protocols & Wireless Networks
Next Generation Internet
Next Generation Web Architectures
Optical Networking
Peer to peer and overlay networks
QoS and Resource Management
Quality of Services and Communication Protocols
Recent trends & Developments in Computer Networks
Routing, switching and addressing techniques
Satelite and Optical Communication Systems
Self-Organizing Networks and Networked Systems
Ubiquitous networks
Wireless communications
Wireless Multimedia systems
Network & Information Security:
Authentication/Authorization Issues
Cryptographic Implementations
Cryptographic protocols
Cryptography and Foundation of Computer Security
Database and System Security
E-mail security, Spam, Phishing, E-mail fraud
IC-card Security, OTP, and Key Management Issues
IDS/Firewall, Anti-Spam mail, Anti-virus issues
Internet Security & Applications
Intrusion Detection and Prevention
Mobile, Ad Hoc and Sensor Network Security
Network and Wireless Network Security
Peer-to-Peer Network Security
Performance Evaluations of Protocols & Security Application
Security & Network Management
Security Issues in Adhoc and Mesh Networks
Security Issues in Complex Networks
Security threats & countermeasures
Ubiquitous Computing Security
Virus, worms, Trojon Protection
Web 2.0 security
Paper Submission Opens: 1st July 2011
Paper Submission Closes: 25th July 2011
Acceptance Notification: After 7 working days from the date of Submission
Online Publication: Immediately after completion of all necessary formalities
Printed Copy: Will be released on 10th August 2011
Other CFPs
- 3rd International Workshop on Mobile Information Retrieval for Future (MIRF2011)
- 2012 2nd Workshop on Design, Control and Software Implementation for Distributed MEMS (dMEMS)
- Annual International Conference on Sustainable Energy and Environmental Sciences
- NIDA-ICCS 2011 NIDA International Conference for Case Studies on Development Administration 2011
- 7th International Conference Mechatronic Systems and Materials (MSM 2011)
Last modified: 2011-07-01 03:18:01