posted by user: leaderstudio || 11863 views || tracked by 38 users: [display]

ICITIS 2011 : 2011 International Conference on Information Theory and Information Security

FacebookTwitterLinkedInGoogle

Link: http://leaderstudio.net/icitis/2011/index.html
 
When Nov 4, 2011 - Nov 6, 2011
Where Hangzhou
Submission Deadline Jul 31, 2011
Notification Due Aug 31, 2011
Final Version Due Aug 31, 2011
Categories    information technology   communication   computer science   information security
 

Call For Papers

2011 IEEE International Conference on Information Theory and Information Security (ICITIS2011) will continue the tradition established by the International Workshop on Information Theory and Information Security, which aims to provide an international forum for researchers to present and discuss recent advances and novel techniques. Original, previously unpublished papers and research contributions are invited and submitted papers should not be currently under review for any other publication. Paper submissions will be handled electronically in the ICITIS2011 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2011. All papers accepted will be included in the IEEE Xplore Digital Library and indexed by EI Compendex and ISTP.

TOPICS of interest include, but are not limited to:

• Internet、Information and Communication Security
• Channel and source coding
• Communication theory and systems
• Information theory and statistics
• Quantum information theory
• Network coding
• Accountability economics of security and privacy
• Anonymity and pseudonymity
• Security in IT outsourcing
• Authentication
• Security of grid computing
• Computer forensics
• Security of eCommerce
• Information hiding and watermarking
• Database security
• Peer-to-peer security
• Security models for ambient intelligence environments
• Security and privacy in pervasive/ubiquitous computing
• Coding theory and practice
• Emerging applications of information theory
• Network and multi-user information theory
• Signal processing
• Access control
• Security in information flow
• Electronic frauds
• Applied cryptography
• Identity management
• Information dissemination control
• The Internet of Things and Applications
• eBusiness and eGovernment
• Wireless Communications and Signal Processing
• Security modeling and architectures
• Trust models and trust management policies
• The Internet of Things and Applications

CONTACT INFORMATION
Website: http://www.iicitis.org/
Email: zhangxm@bupt.edu.cn

Related Resources

JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
GreeNet Symposium - SGNC 2020   11th Symposium on Green Networking and Computing (SGNC 2020)
NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
IEEE-CTISC 2020   2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2020)
ICISSP 2021   7th International Conference on Information Systems Security and Privacy
IEEE-CVIV 2020   2020 2nd International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2020)
CyberHunt 2020   International Workshop on Big Data Analytics for Cyber Threat Hunting
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
IEEE HotICN--Ei, scopus 2020   2020 3rd IEEE International Conference on Hot Information-Centric Networking (IEEE HotICN 2020)--Ei Compendex, scopus
FCSIT 2020   2020 2nd Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2020)