ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ASID 2011 - 2011 International Conference on Anti-Counterfeiting, Security and Identification (2011 ASID)

Date2011-06-24

Deadline2011-01-17

VenueXiamen, China China

Keywords

Websitehttps://fjic.xmu.edu.cn/ASID/

Topics/Call fo Papers

International Conference on Anti-
counterfeiting, Security, and Identification

(2011ASID)

Jun.2011

Xiamen, China

General Information
This conference (the fifth International Conference on Anti -counterfeiting, Security, and Identification) will provide a unique forum for researchers, engineers and educators interested in live demonstrations describing novel work on systems, applications and services of the Internet reaching out into the real world of physical objects. Also, this conference aims to bring together researchers and practitioners that work on problems related to RFID and Antenna, IC Design and System Integration, Wireless Communication and Network Security, Cryptographic Algorithm and Hardware Implementation, Anti-counterfeiting and Identification, as well as Information Management and Industry Polices. The conference, to be held on Jun. , 2011 in Xiamen, China, is co-organized by IEEE Beijing Section. The conference proceedings including all the accepted papers will be published by IEEE and indexed in EI.

Schedule

Paper Submission Deadline

15 JAN,2011

Notification of Acceptance

15 MAR ,2011

Camera-ready Copy

20 APR ,2011

Topics
Conference topics include, but are not limited to:

Internet of Things (IoT):Green by IoT / Green of IoT Technology,Design of future sustainable technologies linking the physical and virtual world,Novel services and applications to facilitate environmental responsibility,Emerging IoT business models and process changes,Communication systems and network architectures for the IoT ,Experience reports from the introduction and operation of networked things in areas such as healthcare, logistics & transport, Emerging applications and interaction paradigms for everyday citizens, Social impacts and consequences, such as security, privacy, opportunities and risks.
RFID Techniques and applications: RFID Technology, Artificial intelligence system, Intelligent electronics, Smart card and Intelligence card reader, Digital rights management.

IC Design and System Integration: IC Design method , RF-IC and Mixture IC, MCM, Embedded System.

EMC Theory and applications: EMC in Communication, Wireless EMC, EMC sensing and Identification, Satellite security EMC, Antenna design.

Pattern recognition and applications: Pattern recognition method, Digital identification.

Cryptograph standards and management: Security standards activities, Trust model and management, Usability aspects of information security systems, Cryptographic algorithm and realization on hardware , Risk evaluation and security certification.

Wireless communication and Networking engineering: Wireless secure communication, Critical infrastructure protection, Internet Technology and Applications, Network modeling and performance analysis.

Next Generation Networking and IPv6: Network architecture for NGN, Technologies of broadband access networks, New IPv6-based services and applications.

Information Management and polices: Information Security Management, Standards and best practices for managing information and systems security.

Last modified: 2011-01-05 17:12:35