posted by user: FUN0524 || 2851 views || tracked by 15 users: [display]

ICNIS 2014 : 2014 International conference on Networks and Information Security

FacebookTwitterLinkedInGoogle

Link: http://www.icnis.org/
 
When Oct 24, 2014 - Oct 26, 2014
Where Beijing, China
Submission Deadline Aug 10, 2014
Notification Due Sep 5, 2014
Final Version Due Sep 20, 2014
Categories    networks   information security   databases   network
 

Call For Papers

2014 International conference on Networks and Information Security
(ICNIS 2014)
Beijing, China
Oct. 24-26, 2014
http://www.icnis.org/

:
The papers accepted by ICNIS 2014 will be published in Journal of Advances in Computer Networks (JACN; ISSN: 1793-8244), which will be included in Engineering & Technology Digital Library, EBSCO, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar.

:
Access control
Anti-malware
Anonymity
Applied cryptography
Authentication and authorization
Biometric security
Data and system integrity
Database security
Distributed systems security
Electronic commerce
Fraud control
Grid security
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management and key recovery
Language-based security
Operating system security
Network security
Risk evaluation and security certification
Security for mobile computing
Security models
Security protocols
Trusted computing
Computer Networks
Computer Networking
Mobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks
Radio Wave Propagation (modelling, channel measurements and characterisation)
Software Defined Radio
Application of FPGA and DSP in Communication Devices and Networks
Ad-hoc Networks
Signal Processing for Wireless Communications
Modulation, Coding and Multiple Access Schemes in Communications
Internet and Intranet Technologies and Services
Intelligent Spatial and Co-located Data Access and Management
Information Theory and Coding Theory
Networking Theory and Technologies
Antennas Simulation, Design, Measurements and Applications
Microwave (RF) System Simulations, Design, Build and Measurements
Network and Data Security
Hardware and Software Applications
Communication Protocols and Standards
University-Industry Collaboration or Knowledge Transfer Activities
Network Architecture
Network Interfaces
Network Reliability
Network Performance
Network Management
Network protocols
Quality Service Issues
Wireless Protocol, Architecture and Design Concerns
Adhoc Networks
Heterogeneous Networks
High Performance Network Protocol
Services and Interconnection of High Speed Networks
Methodologies and development for high speed Network
Performance in High Speed Network
VoIP Blue tooth Technology
Broadband Access Control
Wireless Access Control
Security Issues
Cryptography
Network Security
Wireless Network Security
Information Hiding, Stegnography, Watermarking
Security in High speed network
Biometrics
Identification and trust Methodology
Forensic
Peer to Peer Security
Network intrusion, detection and prevention

:
via: icnis@iacsit.net (.pdf/.doc)

:
Ms. Joice Deng,
Tel: +86-28-8652-7868
E-mail: icnis@iacsit.net

Related Resources

JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
MLTEC 2022   3rd International Conference on Machine Learning Techniques
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus
DMS 2022   13th International conference on Database Management Systems
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)
DRIJ 2022   Dental Research: An International Journal
DSDE--Ei 2023   2023 the 6th International Conference on Data Storage and Data Engineering (DSDE 2023)
IJCNN 2023   International Joint Conference on Neural Networks