WCNIS: Wireless Communications, Networking and Information Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2011 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
WCNIS 2010 IEEE International Conference on Wireless Communications, Networking and Information Security
Jun 25, 2010 - Jun 27, 2010 Beijing, China Jan 25, 2010
 
 

Present CFP : 2010

2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS2010) provides a forum for researchers and practitioners involved in different but related domains to confront research results and discuss key issues in communications, networking and security. Authors are invited to submit papers to the following four symposia. but not limited to:

Wireless Communication Systems Symposium
● Cooperative Communications
● Cognitive Radio and Software Defined Radio
● Coding, Modulation and Diversity Techniques
● Channel Measurement and Modelling
● Cross-Layer Design and Optimization
● Distributed Space-Time Techniques
● Joint Source-channel Coding for Wireless Communications
● Multi-cell Cooperation
● Multi-hop transmission
● Wireless Multicasting
● MIMO and Space-Time Coding
● Multi-user Detection, Signal Separation and Interference Rejection
● Mobility and Localization Techniques
● Network Coding
● OFDM and Multi-Carrier Systems
● Opportunistic Scheduling
● Resource Allocation and Interference Management
● Synchronization
● Satellite Communications
● Short range communications
● Ultra-wideband Communications

Communications Theory and Signal Processing Symposium
● Adaptive Antenna Arrays
● Adaptive Modulation and Coding
● Channel Estimation, Modeling and Equalization
● Coding for OFDM and Multi-carrier Systems
● Channel Capacity and Channel Coding
● CDMA and Spread Spectrum
● Diversity and Fading Countermeasures
● Hardware and Implementation
● Information Theory
● Iterative Techniques, Detection and Decoding
● Interference Management, Cancellation, Avoidance
● Network Information Theory and Coding
● Network Coding
● Performance Analysis for wireless channels
● Space-time Coding and Processing
● Source Coding and Data Compression
● SP for Software Defined Radio
● Signal Detection, and Synchronization
● Spectrum Sensing for Cognitive Radios
● Speech, Image and Video Signal Processing for communications
● Turbo, LDPC and Other Channel Codes

Wireless Network Symposium
● Architectural design and operation models
● Body-area wireless networks
● Cellular systems (2G/2.5G/3G/4G and beyond)
● Cross-layer design and optimization
● Deep space communications
● Delay/Disruption tolerant wireless networks
● End-to-end protocol, flow and congestion control
● Fault-tolerance and traffic reliability issues
● Inter-networking of wireless heterogeneous and multi-tier networks
● Satellite systems, proxy and gateways
● Multimode wireless networks
● MAC schemes
● Mobile Routing/Switching and multicasting protocols
● Network planning, capacity analysis, and topology control
● WMAN, and other broadband wireless access technologies
● WLAN, WPAN, and other home/personal network technologies
● Pervasive and wearable computing
● Power management and control, and energy conservation techniques
● Resource management, mobility management, and admission control
● Service-centric and overlay networks
● Test-beds and deployment
● User cooperation and incentive schemes
● Validation and verification schemes
● Wireless wide area networks
● Wireless networks for vehicle, underwater, UAVs communications
● Wireless mesh networks
● Wireless Internet
● Wireless Network Performance
● Wireless network monitoring

Communications and Information Security Symposium
● Access Control
● Accounting and Audit
● Anonymity and Pseudonymity
● Applied Cryptography
● Attacks and Prevention of Online Fraud
● Authentication and Non-repudiation
● Biometrics
● Cryptographic Protocols and Functions
● Database and System Security
● Design and Analysis of Cryptographic Algorithms
● Digital Rights Management
● Economics of Security and Privacy
● Formal Methods in Security
● Foundations of Computer Security
● Identity and Trust Management
● Information Hiding and Watermarking
● Infrastructure Security
● Intrusion Detection, Tolerance and Prevention
● Mobile, Ad Hoc and Sensor Network Security
● Network and Wireless Network Security
● Peer-to-Peer Network Security
● PKI and PMI
● Private Searches
● Security and Privacy in Pervasive/Ubiquitous Computing
● Security in Information Flow
● Security for Mobile Code
● Security of Grid Computing
● Security of eCommerce, eBusiness and eGovernment
● Security Modeling and Architectures
● Security Models for Ambient Intelligence environments
● Trusted Computing

Prospective authors are encouraged to submit a full paper for review before January 25, 2010, in PDF format, Only original papers that have not been published or submitted for publication elsewhere will be considered, All accepted papers will be presented in oral sessions or poster sessions.
 

Related Resources

ICCC 2023   IEEE--2023 9th International Conference on Computer and Communications (ICCC 2023)
GreeNet Symposium - SGNC 2023   14th Symposium on Green Networking and Computing (SGNC 2023)
icWCSN 2024   2024 11th International Conference on Wireless Communication and Sensor Networks (icWCSN 2024)
IEEE Xplore-Ei/Scopus-CCCAI 2023   2023 International Conference on Communications, Computing and Artificial Intelligence (CCCAI 2023) -EI Compendex
icWCSN--Ei 2024   2024 11th International Conference on Wireless Communication and Sensor Networks (icWCSN 2024)
CGDEIJ 2023   Computer Game Development and Education: An International Journal
NISecurity 2023   2023 International Conference on Network and Information Security (NISecurity 2023)
AE 2023   7th International Conference on Advances in Engineering
SECITC 2023   16th International Conference on Security for Information Technology and Communications
WCCCT 2024   2024 7th World Conference on Computing and Communication Technologies (WCCCT 2024)