NSWCTC 2010 - 2010 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC)
Topics/Call fo Papers
Area 1: Networks Security
Intrusion Detection and Prevention
Biometric Security and Artificial Intelligence
Cryptography and security protocols
Authentication and Identification
Bayesian Networks, Fuzzy and Rough Set
Mobile System Security
Ubiquitous Computing Security
Sensor and Mobile Ad Hoc Network Security
Security in Wireless Network
Security of GSM/GPRS/UMTS systems
Security for Grid Computing
Security for Web Services
Security for Personal Data and Databases
Peer-to-Peer Security
Risk Assessment
Forecasting Terrorism
Denial of Service and other attacks
Management of Computing Security
Intelligent Multimedia Security Services
Knowledge Discovery and Data Mining
E-commerce protocols
E-Health
Area 2:Wireless Communications
UWB and Impulse Radio
Channel Modeling and Characterization
Modulation/Coding/Signal Processing
B3G Systems, WiMAX and WLAN
Advances in Wireless Video
RFID Technologies
Mobility and Handoff Management
Wireless/mobile networked Applications
Multimedia in Wireless Ad-hoc Networks
Authentication, Authorization and Billing
Location Based Services (LBS)
Applications and Services for B3G/4G era
Radio Resource Management
Networking and Systems
Wireless sensors networking
Network measurement and Management
Ad hoc and sensor networks
Multimedia QoS and traffic Management
Internetworking of WLAN & Cellular Networks
Network protocols for Mobile Networks
Area 3:Trusted Computing
Theory and Models of Trust
Trust Establishment
Trust Propagation and Management
Trusted Software and Database
Trusted Computing Platform
Trusted Operating System
Trusted Network Computing
Trusted Autonomic Computing
Trusted Services and Applications
Trust in E-commerce
Trust in E-government
Trust in Mobile Network
Trust in Wireless Network
Trusted in Communications
Trust-related Security and Privacy
Reliable System
Dependable Systems
Fault-tolerant System
Survivable Systems
Key Management
Intrusion Detection and Prevention
Biometric Security and Artificial Intelligence
Cryptography and security protocols
Authentication and Identification
Bayesian Networks, Fuzzy and Rough Set
Mobile System Security
Ubiquitous Computing Security
Sensor and Mobile Ad Hoc Network Security
Security in Wireless Network
Security of GSM/GPRS/UMTS systems
Security for Grid Computing
Security for Web Services
Security for Personal Data and Databases
Peer-to-Peer Security
Risk Assessment
Forecasting Terrorism
Denial of Service and other attacks
Management of Computing Security
Intelligent Multimedia Security Services
Knowledge Discovery and Data Mining
E-commerce protocols
E-Health
Area 2:Wireless Communications
UWB and Impulse Radio
Channel Modeling and Characterization
Modulation/Coding/Signal Processing
B3G Systems, WiMAX and WLAN
Advances in Wireless Video
RFID Technologies
Mobility and Handoff Management
Wireless/mobile networked Applications
Multimedia in Wireless Ad-hoc Networks
Authentication, Authorization and Billing
Location Based Services (LBS)
Applications and Services for B3G/4G era
Radio Resource Management
Networking and Systems
Wireless sensors networking
Network measurement and Management
Ad hoc and sensor networks
Multimedia QoS and traffic Management
Internetworking of WLAN & Cellular Networks
Network protocols for Mobile Networks
Area 3:Trusted Computing
Theory and Models of Trust
Trust Establishment
Trust Propagation and Management
Trusted Software and Database
Trusted Computing Platform
Trusted Operating System
Trusted Network Computing
Trusted Autonomic Computing
Trusted Services and Applications
Trust in E-commerce
Trust in E-government
Trust in Mobile Network
Trust in Wireless Network
Trusted in Communications
Trust-related Security and Privacy
Reliable System
Dependable Systems
Fault-tolerant System
Survivable Systems
Key Management
Other CFPs
- 2010 International Conference on Biomedical Engineering and Computer Science (ICBECS)
- 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT)
- IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB 2010)
- 2010 International Conference on Measuring Technology and Mechatronics Automation (ICMTMA 2010)
- The 2010 Chinese Control and Decision Conferen-ce (2010 CCDC)
Last modified: 2010-06-04 19:32:22