您现在在的位置: 来华事务>国际会议预知>正文                                            发布时间:2010-12-07    点击:2675次

2010年信息论与信息安全国际会议(ICITIS 2010)


 

2010年信息论与信息安全国际会议ICITIS 2010)

http://www.iicitis.org/    

20101217~19日,中国北京

2010年信息论与信息安全国际会议(ICITIS 2010将于1217-19日在北京召开。本次会议由IEEE北京分会主办,北京邮电大学信息安全中心承办。ICITIS2010将为全球计算机科学与信息安全研究人员和实际工作者提供公布新发现和探讨新方法的平台。

本次会议论文集将被EiISTP检索并进入IEEE Xplore优秀论文将推荐至《China communication》(SCIE检索)和  IGI group- International Journal of Digital Crime and Forensics (ISSN:1941-6210).国外投稿版面费和会议费全免 

 

征文要求:只接受英文稿件

重要日期:

论文提交截止日期:    8月30日

论文接收通知时间:    11月15日

预注册交费截止时间:  11月30日

大会及观光旅游:        12月17~19日

会议网址http://www.iicitis.org/

邮箱:      icitis@leaderstudio.net

 

 Sponsor

IEEE Section Beijing

Co-Sponsor

Beijing University of Posts and

Telecommunications

Organizer

Information Security Center, Beijing University of Posts and Telecommunications

Technical Co-Sponsor

Chinese Institute of Electronics

 

2010 IEEE International Conference on Information Theory and Information Security(ICITIS2010) aims to provide an international forum for researchers to present and discuss recent advances and novel techniques in information theory and information security. Original, previously unpublished papers and research contributions are invited. Late-breaking results and early stage research are heartily encouraged. Paper submissions will be handled electronically in the ICITIS2010 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2010. All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex and ISTP. Foreign contributors are all free

Selected best papers will be expanded and revised, as required, for the Journal Special Issues of <China Communications>(indexed by SCIE). Best Student Papers award will be granted at ICITIS2010. The first author of the best student paper must be a full-time student.

 

TOPICS of interest include, but are not limited to, the following:

 

 Channel and source coding

 Coding theory and practice

 Communication theory and systems

 Emerging applications of information theory

 Information theory and statistics

 Network and multi-user information theory

 Quantum information theory

 Signal processing

 Network coding

 Access control

 Accountability economics of security

and privacy

 Security in information flow

 Anonymity and pseudonymity

 Electronic frauds

 Security in IT outsourcing

 Applied cryptography

 Authentication

 Identity management

 Security of grid computing

 Information dissemination control

 Computer forensics

 Intrusion detection

 Security of eCommerce

 eBusiness and eGovernment

 Information hiding and watermarking

 Digital right management

 Database security

 Security modeling and architectures

 Peer-to-peer security

 Trust models and trust management policies

 Security models for ambient intelligence environments

 and privacy in pervasive/ubiquitous computing

 

 

IMPORTANT DATES

Paper Submission Deadline:     Aug. 30, 2010

Acceptance Notification:         Nov. 15, 2010

Camera-Ready Copy Due:        Nov. 30, 2010

Conference Date:                  Dec. 17-19, 2010

 

 

CONTACT INFORMATION

Website:        www.leaderstudio.net

E-mail:           icitis@leaderstudio.net




返回首页    返回顶部