ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICITIS 2011 - 2011 IEEE International Conference on Information Theory and Information Security

Date2011-11-04

Deadline2011-03-26

VenueHangzhou, China China

Keywords

Websitehttps://www.leaderstudio.net

Topics/Call fo Papers

Sponsors

IEEE Beijing Section
Zhejiang University of Technology
Beijing University of Posts and Telecommunications
Chinese Institute of Electronics
Natural Science Foundation of China

Organizer

Information Security Center, Beijing University of Posts and Telecommunications
Zhejiang Provincial Key Laboratory of Fiber OpticCommunication Technology

2011IEEE International Conference on Information Theory and Information Security (ICITIS2011) will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.

Selected best papers will be expanded and revised, as required, for the Journal Special Issues of 《China Communications(indexed by SCIE).

TOPICS of interest include, but are not limited to:

Channel and source coding
Communication theory and systems
Information theory and statistics
Quantum information theory
Network coding
Accountability economics of security and privacyAnonymity and pseudonymity
Security in IT outsourcing
AuthenticationSecurity of grid computing
Computer forensics
Security of eCommerce
Information hiding and watermarking
Database securityPeer-to-peer security
Security models for ambient intelligence environments
Coding theory and practice
Emerging applications of information theory
Network and multi-user information theory
Signal processing
Access controlSecurity in information flow
Electronic fraudsApplied cryptographyIdentity management
Information dissemination controlIntrusion detectione
Business and eGovernment
Digital right management
Security modeling and architectures
Trust models and trust management policies
Security and privacy in pervasive/ubiquitous computing

CONTACT INFORMATION

Website: http://www.leaderstudio.net/
Email: icitis2011-AT-leaderstudio.net

Last modified: 2010-12-24 16:32:11