ICITIS 2012 - 2012 3rd IEEE International Conference on Information Theory and Information Security(ICITIS 2012)
Date2012-07-27
Deadline2012-05-30
VenueQinhuangda, China
KeywordsNetwork Coding and Signal Processing;Information Engineering and Computational Intelligence;Internet and Information Security;Communication and Networking;Computer Technology and Application
Websitehttps://www.iicitis.org
Topics/Call fo Papers
International Conference on Information Theory and Information Security (ICITIS) is an annual conference series since 2010. Past conferences have attracted an average of 700 submissions per year by participants from different parts of the globe.
2012 3rd IEEE International Conference on Information Theory and Information Security (ICITIS2012) is organized by Information Security Center, Beijing University of Posts and Telecommunications, which will be held on July 27-29, 2012 in Qinhuangdao, China. ICITIS 2012 will keep promoting the information exchange on information theory, information security, computer technology, telecommunication technology, networking and related fields, which aims to promote
international academic exchange and international cooperation.
Original papers are invited and submitted papers should not be previously published or currently under review for any other publication. All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex. The Proceedings of ICITIS2010 have been indexed by Ei Compendex successfully two months after the conference.
CONFERENCE HIGHLIGHTS
? The conference’s theme will be addressed in the keynote speeches, special sessions and workshops, including Network Coding and Signal Processing, Information Engineering and Computational Intelligence, Internet and Information Security, Computer Technology and Applications and Communication and Networking.
The best papers will be expanded and revised, then published in the international journal of computational intelligence systems, which indexed by SCIE and EI, and impact factor is 1.471.
? There will be concessional registration fee for IEEE members and students.
? All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO:
Network Coding and Signal Processing
1). Network Coding for Wired, Wireless and Optical Networks
2). Application of Network Coding
3). Signal Processing
Information Engineering and Computational Intelligence
1). Artificial Intelligence and Its Application
2). Intelligent Data Management
3). Green Computing
4). Information Retrieval
Internet and Information Security
1). Network Security
2). Cryptography
3). Mobile and Wireless Security
4). Computer Forensics and Incident Response
5). Software and Systems Security
6). XML, Web Services and Cloud Security
7). Information Hiding and Watermarking
8). Internet Technologies
Computer Technology and Application
1). Computer Design & VLSI
2). Data Mining & Data Engineering
3). Intelligent Systems
4). Software Engineering
5). Computer Modeling and Simulation
6). Computer Applications
Communication and Networking
1).Wireless Communications
2). Ad-hoc, Sensor and Mesh Networking
3). Optical Communication and Networking
4). Infrastructure for Next Generation Networks
5). Communication Hardware Design
6). Communication Software
7). Network Applications & Services
Important Dates:
Paper Submission Deadline for Round I: Dec. 5, 2011
Paper Submission Deadline for Round II: Mar. 30, 2012
Paper Submission Deadline for Round III: May. 30, 2012
Acceptance Notification: 10-20 days after submission
Camera-Ready: June 10, 2012
CONTACT INFORMATION
Website: www.iicitis.org
http://www.leaderstudio.net/icitis/2012/index.html
Email: icitis2012-AT-leaderstudio.net, zhangxm-AT-bupt.edu.cn
Tel: 86-10-62222430
2012 3rd IEEE International Conference on Information Theory and Information Security (ICITIS2012) is organized by Information Security Center, Beijing University of Posts and Telecommunications, which will be held on July 27-29, 2012 in Qinhuangdao, China. ICITIS 2012 will keep promoting the information exchange on information theory, information security, computer technology, telecommunication technology, networking and related fields, which aims to promote
international academic exchange and international cooperation.
Original papers are invited and submitted papers should not be previously published or currently under review for any other publication. All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex. The Proceedings of ICITIS2010 have been indexed by Ei Compendex successfully two months after the conference.
CONFERENCE HIGHLIGHTS
? The conference’s theme will be addressed in the keynote speeches, special sessions and workshops, including Network Coding and Signal Processing, Information Engineering and Computational Intelligence, Internet and Information Security, Computer Technology and Applications and Communication and Networking.
The best papers will be expanded and revised, then published in the international journal of computational intelligence systems, which indexed by SCIE and EI, and impact factor is 1.471.
? There will be concessional registration fee for IEEE members and students.
? All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO:
Network Coding and Signal Processing
1). Network Coding for Wired, Wireless and Optical Networks
2). Application of Network Coding
3). Signal Processing
Information Engineering and Computational Intelligence
1). Artificial Intelligence and Its Application
2). Intelligent Data Management
3). Green Computing
4). Information Retrieval
Internet and Information Security
1). Network Security
2). Cryptography
3). Mobile and Wireless Security
4). Computer Forensics and Incident Response
5). Software and Systems Security
6). XML, Web Services and Cloud Security
7). Information Hiding and Watermarking
8). Internet Technologies
Computer Technology and Application
1). Computer Design & VLSI
2). Data Mining & Data Engineering
3). Intelligent Systems
4). Software Engineering
5). Computer Modeling and Simulation
6). Computer Applications
Communication and Networking
1).Wireless Communications
2). Ad-hoc, Sensor and Mesh Networking
3). Optical Communication and Networking
4). Infrastructure for Next Generation Networks
5). Communication Hardware Design
6). Communication Software
7). Network Applications & Services
Important Dates:
Paper Submission Deadline for Round I: Dec. 5, 2011
Paper Submission Deadline for Round II: Mar. 30, 2012
Paper Submission Deadline for Round III: May. 30, 2012
Acceptance Notification: 10-20 days after submission
Camera-Ready: June 10, 2012
CONTACT INFORMATION
Website: www.iicitis.org
http://www.leaderstudio.net/icitis/2012/index.html
Email: icitis2012-AT-leaderstudio.net, zhangxm-AT-bupt.edu.cn
Tel: 86-10-62222430
Other CFPs
- 2013 International Conference on Advanced Polymeric Materials (APM 2013)
- 24th ACM Symposium on Parallelism in Algorithms and Architectures
- 39th International Colloquium on Automata, Languages and Programming (ICALP 2012)
- The 27th IEEE Conference on Computational Complexity
- 2012 International Conference on Systems and Control (ICSC)
Last modified: 2011-11-23 10:46:58