ICITIS 2010 - 2010 IEEE International Conference on Information Theory and Information Security ICITIS 2010
Topics/Call fo Papers
ICITIS2010 aims to provide an international forum for researchers to present and discuss recent advances and novel techniques in information theory and information security. Original, previously unpublished papers and research contributions are invited. Late-breaking results and early stage research are heartily encouraged. Paper submissions will be handled electronically in the ICITIS2010 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2010. All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex and ISTP.
TOPICS of interest include, but are not limited to, the following:
Channel and source coding
Coding theory and practice
Communication theory and systems
Emerging applications of information theory
Information theory and statistics
Network and multi-user information theory
Quantum information theory
Signal processing
Network coding
Access control
Digital right management
Security and privacy in pervasive/ubiquitous computing
Accountability economics of security and privacy
Security in information flow
Anonymity and pseudonymity
Electronic frauds
Security in IT outsourcing
Applied cryptography
Authentication
Identity management
Security of grid computing
Information dissemination control
Computer forensics
Intrusion detection
Security of eCommerce
eBusiness and eGovernment
Network security
Information hiding and watermarking
Security models for ambient intelligence environments
Database security
Security modeling and architectures
Peer-to-peer security
Trust Models and trust management policies
TOPICS of interest include, but are not limited to, the following:
Channel and source coding
Coding theory and practice
Communication theory and systems
Emerging applications of information theory
Information theory and statistics
Network and multi-user information theory
Quantum information theory
Signal processing
Network coding
Access control
Digital right management
Security and privacy in pervasive/ubiquitous computing
Accountability economics of security and privacy
Security in information flow
Anonymity and pseudonymity
Electronic frauds
Security in IT outsourcing
Applied cryptography
Authentication
Identity management
Security of grid computing
Information dissemination control
Computer forensics
Intrusion detection
Security of eCommerce
eBusiness and eGovernment
Network security
Information hiding and watermarking
Security models for ambient intelligence environments
Database security
Security modeling and architectures
Peer-to-peer security
Trust Models and trust management policies
Other CFPs
- The Fifth International Conference on Innovative Computing, Information and Control (ICICIC2010)
- The International Summer School on Crystal Growth ISSCG-14 2010
- The 16th International Conference on Crystal Growth(ICCG-16)
- The 14th International Conference on Vapor Growth and Epitaxy(ICVGE-14)
- Advanced School on Frontier of Technology Enhanced Learning
Last modified: 2010-06-04 19:32:22