NSWCTC 2012 - 2012 4th International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC)
Topics/Call fo Papers
Authors are invited to submit original unpublished manuscripts that demonstrate recent advances the following areas of interest, but are not limited to:
Area 1: Networks Security
Intrusion Detection and Prevention
Biometric Security and Artificial Intelligence
Cryptography and security protocols
Authentication and Identification
Bayesian Networks, Fuzzy and Rough Set
Mobile System Security
Ubiquitous Computing Security
Sensor and Mobile Ad Hoc Network Security
Security in Wireless Network
Security of GSM/GPRS/UMTS systems
Security for Grid Computing
Security for Web Services
Security for Personal Data and Databases
Peer-to-Peer Security
Risk Assessment
Forecasting Terrorism
Denial of Service and other attacks
Management of Computing Security
Intelligent Multimedia Security Services
Knowledge Discovery and Data Mining
E-commerce protocols
E-Health
Area 2:Wireless Communications
UWB and Impulse Radio
Channel Modeling and Characterization
Modulation/Coding/Signal Processing
B3G Systems, WiMAX and WLAN
Advances in Wireless Video
RFID Technologies
Mobility and Handoff Management
Wireless/mobile networked Applications
Multimedia in Wireless Ad-hoc Networks
Authentication, Authorization and Billing
Location Based Services (LBS)
Applications and Services for B3G/4G era
Radio Resource Management
Networking and Systems
Wireless sensors networking
Network measurement and Management
Ad hoc and sensor networks
Multimedia QoS and traffic Management
Internetworking of WLAN & Cellular Networks
Network protocols for Mobile Networks
Area 3:Trusted Computing
Theory and Models of Trust
Trust Establishment
Trust Propagation and Management
Trusted Software and Database
Trusted Computing Platform
Trusted Operating System
Trusted Network Computing
Trusted Autonomic Computing
Trusted Services and Applications
Trust in E-commerce
Trust in E-government
Trust in Mobile Network
Trust in Wireless Network
Trusted in Communications
Trust-related Security and Privacy
Reliable System
Dependable Systems
Fault-tolerant System
Survivable Systems
Key Management
Area 1: Networks Security
Intrusion Detection and Prevention
Biometric Security and Artificial Intelligence
Cryptography and security protocols
Authentication and Identification
Bayesian Networks, Fuzzy and Rough Set
Mobile System Security
Ubiquitous Computing Security
Sensor and Mobile Ad Hoc Network Security
Security in Wireless Network
Security of GSM/GPRS/UMTS systems
Security for Grid Computing
Security for Web Services
Security for Personal Data and Databases
Peer-to-Peer Security
Risk Assessment
Forecasting Terrorism
Denial of Service and other attacks
Management of Computing Security
Intelligent Multimedia Security Services
Knowledge Discovery and Data Mining
E-commerce protocols
E-Health
Area 2:Wireless Communications
UWB and Impulse Radio
Channel Modeling and Characterization
Modulation/Coding/Signal Processing
B3G Systems, WiMAX and WLAN
Advances in Wireless Video
RFID Technologies
Mobility and Handoff Management
Wireless/mobile networked Applications
Multimedia in Wireless Ad-hoc Networks
Authentication, Authorization and Billing
Location Based Services (LBS)
Applications and Services for B3G/4G era
Radio Resource Management
Networking and Systems
Wireless sensors networking
Network measurement and Management
Ad hoc and sensor networks
Multimedia QoS and traffic Management
Internetworking of WLAN & Cellular Networks
Network protocols for Mobile Networks
Area 3:Trusted Computing
Theory and Models of Trust
Trust Establishment
Trust Propagation and Management
Trusted Software and Database
Trusted Computing Platform
Trusted Operating System
Trusted Network Computing
Trusted Autonomic Computing
Trusted Services and Applications
Trust in E-commerce
Trust in E-government
Trust in Mobile Network
Trust in Wireless Network
Trusted in Communications
Trust-related Security and Privacy
Reliable System
Dependable Systems
Fault-tolerant System
Survivable Systems
Key Management
Other CFPs
- IVth International Conference on Biotechniques for Air Pollution Control (Biotechniques-2011)
- TRUST 2011: 4th International Conference on Trust and Trustworthy Computing
- International CTIA WIRELESS 2011
- Data Mining and Intelligent Systems in Healthcare Ming
- China International Construction Machinery Exhibition (CME2011)
Last modified: 2011-01-26 18:44:56