ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICITIS 2011 - 第二届 IEEE 信息?与信息安全国?会?(ICITIS2011)

Date2011-11-04

Deadline2011-07-30

VenueHangzhou, China China

KeywordsCommunications; Information Theroy; Information Security; Communication Security

Websitehttp://www.ieccr.net

Topics/Call fo Papers

ICITIS 2011
2011 International Conference on Information Theory and Information Security
第二届 IEEE 信息?与信息安全国?会?

November 4-6, 2011 Hangzhou, China

2011 International Conference on Information Theory and Information Security (ICITIS2011) will be held on November 4-6, 2011 in Hangzhou, China. This conference will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.

TOPICS of interest include, but are not limited to, the following:

Channel and source coding
Coding theory and practice
Communication theory and systems
Emerging applications of information theory
Information theory and statistics
Network and multi-user information theory
Quantum information theory
Signal processing
Network coding
Access control
Accountability economics of security and privacy
Security in information flow
Anonymity and pseudonymity
Electronic frauds
Security in IT outsourcing
Applied cryptography
Authentication
Identity management
Security of grid computing
Information dissemination control
Computer forensics
Intrusion detection
Security of eCommerce
eBusiness and eGovernment
Information hiding and watermarking
Digital right management
Database security
Security modeling and architectures
Peer-to-peer security
Trust Models and trust management policies
Security models for ambient intelligence environments
Security and privacy in pervasive/ubiquitous computing

Last modified: 2011-04-22 11:33:11