ICITIS 2011 - 2011 IEEE International Conference on Information Theory and Information Security
Topics/Call fo Papers
Sponsors
IEEE Beijing Section
Zhejiang University of Technology
Beijing University of Posts and Telecommunications
Chinese Institute of Electronics
Natural Science Foundation of China
Organizer
Information Security Center, Beijing University of Posts and Telecommunications
Zhejiang Provincial Key Laboratory of Fiber OpticCommunication Technology
2011IEEE International Conference on Information Theory and Information Security (ICITIS2011) will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.
Selected best papers will be expanded and revised, as required, for the Journal Special Issues of 《China Communications(indexed by SCIE).
TOPICS of interest include, but are not limited to:
Channel and source coding
Communication theory and systems
Information theory and statistics
Quantum information theory
Network coding
Accountability economics of security and privacyAnonymity and pseudonymity
Security in IT outsourcing
AuthenticationSecurity of grid computing
Computer forensics
Security of eCommerce
Information hiding and watermarking
Database securityPeer-to-peer security
Security models for ambient intelligence environments
Coding theory and practice
Emerging applications of information theory
Network and multi-user information theory
Signal processing
Access controlSecurity in information flow
Electronic fraudsApplied cryptographyIdentity management
Information dissemination controlIntrusion detectione
Business and eGovernment
Digital right management
Security modeling and architectures
Trust models and trust management policies
Security and privacy in pervasive/ubiquitous computing
CONTACT INFORMATION
Website: http://www.leaderstudio.net/
Email: icitis2011-AT-leaderstudio.net
IEEE Beijing Section
Zhejiang University of Technology
Beijing University of Posts and Telecommunications
Chinese Institute of Electronics
Natural Science Foundation of China
Organizer
Information Security Center, Beijing University of Posts and Telecommunications
Zhejiang Provincial Key Laboratory of Fiber OpticCommunication Technology
2011IEEE International Conference on Information Theory and Information Security (ICITIS2011) will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.
Selected best papers will be expanded and revised, as required, for the Journal Special Issues of 《China Communications(indexed by SCIE).
TOPICS of interest include, but are not limited to:
Channel and source coding
Communication theory and systems
Information theory and statistics
Quantum information theory
Network coding
Accountability economics of security and privacyAnonymity and pseudonymity
Security in IT outsourcing
AuthenticationSecurity of grid computing
Computer forensics
Security of eCommerce
Information hiding and watermarking
Database securityPeer-to-peer security
Security models for ambient intelligence environments
Coding theory and practice
Emerging applications of information theory
Network and multi-user information theory
Signal processing
Access controlSecurity in information flow
Electronic fraudsApplied cryptographyIdentity management
Information dissemination controlIntrusion detectione
Business and eGovernment
Digital right management
Security modeling and architectures
Trust models and trust management policies
Security and privacy in pervasive/ubiquitous computing
CONTACT INFORMATION
Website: http://www.leaderstudio.net/
Email: icitis2011-AT-leaderstudio.net
Other CFPs
- High Speed Rail World Europe 2011
- High Speed Rail World Australia Conference 2011
- DEBUNKING THE MUSE: LEADERSHIP IN HIGHER EDUCATION RE-ENVISIONED -- NEW CONFIGURATIONS (Guest Editor: R.-L. Etienne Barnett)
- 2012 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)
- 2012 International Conference on Systems, Signals and Image Processing (IWSSIP)
Last modified: 2010-12-24 16:32:11