2010-02-24

[Tccc] [ICITIS2010]IEEE 2010 International Conference--call for papers

[ICITIS2010]IEEE 2010 International Conference--call for papers

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Call for papers
2010 International Conference on Information Theory and Information Security (ICITIS 2010)
December 17-19, 2010, Beijing, China
http://www.iicitis.org/
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
INTRODUCTION
==============

Sponsor
IEEE Section BeijingCo-Sponsor
Beijing University of Posts and Telecommunications
Organizer
Information Security Center, Beijing University of Posts and Telecommunications
Technical Co-Sponsor
Chinese Institute of Electronics

OVERVIEW
ICITIS2010 aims to provide an international forum for researchers to present and discuss recent advances and novel techniques in information theory and information security. Original, previously unpublished papers and research contributions are invited. Late-breaking results and early stage research are heartily encouraged. Paper submissions will be handled electronically in the ICITIS2010 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2010. All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by EI Compendex and ISTP.

TOPICS of interest include, but are not limited to, the following:
Channel and source coding Coding theory and practice
Communication theory and systems Emerging applications of information theory
Information theory and statistics Network and multi-user information theory
Quantum information theory Signal processing
Network coding Access control
Accountability economics of security and privacy Security in information flow
Anonymity and pseudonymity Electronic frauds
Security in IT outsourcing Applied cryptography
Authentication Identity management
Security of grid computing Information dissemination control
Computer forensics Intrusion detection
Security of eCommerce eBusiness and eGovernment
Information hiding and watermarking Digital right management
Database security Security modeling and architectures
Peer-to-peer security Trust models and trust management policies
Security models for ambient intelligence environments Security and privacy in pervasive/ubiquitous computing

IMPORTANT DATES
Paper Submission Deadline: Aug. 30, 2010
Acceptance Notification: Nov. 15, 2010
Camera-Ready Copy Due: Nov. 30, 2010
Conference Date: Dec. 17-19, 2010

CONTACT INFORMATION
Website: http://www.iicitis.org/
E-mail
: meeting@bupt.cn

General Co-Chairs:
Prof. Yixian Yang, Beijing University of Posts and Telecommunications , China
Prof. Shuoyan Li, Chinese University of Hong Kong , Hong Kong , China
Prof. Fuji Ren, Tokushima University, Japan
Prof. Robert H.Deng, Singapore Management University , Singapore
Program Committee Co-Chairs:
Prof. Pingzhi Fan, Southwest Jiaotong University, China
Prof. Dongfeng Yuan, Shandong University , China
Program Committee Members:
Prof. Baoyu Zheng, Nanjing University of Posts and Telecommunications, China
Prof. Xiaodong Lin, University of Ontario Institute of Technology, Canada
Prof. Mang I Vai, University of Macau, Macau
Prof. Ping Li, City University of Hongkong, Hongkong
Prof. Chi Zhou, Illinois Institute of Technology, USA
Prof. Vladimir A. Oleshchuk, University of Agder, Norway
Prof. Peiliang Qiu, Zhejiang University, China
Prof. Gang Wei, South China University of Technology, China
Prof. Baoming Bai, Xidian University, China
Prof. Chen He, Shanghai Jiao Tong University, China
Prof. Fangwei Fu, Nankai University, China
Prof. Xiaoyu Chen, Zhejiang Gongshang University, China
Prof. Beixing Deng, Tsinghua University, China
Prof. Sidan Du, Nanjing University, China
Prof. Chunpin Hou, Tianjin University, China
Prof. Hui Li, Xidian University, China
Prof. Quan Zhou, Xi'an Institute of Space Radio Technology, China
Prof. Guangqiu Li, Hangzhou Dianzi University, China
Prof. Xiao Ma, Sun Yat-Sen University, China
Prof. Limin Meng, Zhejiang University of Technology, China
Prof. Kai Niu, Beijing University of Posts and Telecommunications, China
Prof. Chaojing Tang, National University Of Defense Technology, China
Prof. Chengqian Xu, Yanshan University, China
Prof. Mangui Liang, Beijing Jiaotong University, China
Prof. Wu Luo, Peking University, China
Prof. Yuan Luo, Shanghai Jiao Tong University, China
Prof. Xiaoxiang Wang, Beijing University of Posts and Telecommunications, China
Prof. Shutao Xia, Tsinghua University, China
Prof. Dianwu Yue, Dalian Maritime University, China
Prof. Wenping Ma, Xidian University, China
Prof. Chunfu Jia, Nankai University, China
Prof. Yangchen Yang, Beihang University, China
Prof. Xin Wang, Fudan University, China
Prof. Yingpu Deng, Chinese Academy of Sciences, China
Prof. Xianzhong Xie, Chongqing University of Posts and Telecommunications, China
Prof. Ying Li, Xidian University, China
Prof. Yun Chen, Chengdu University of Information Technology, China
Prof. Shaohua Tang, South China University of Technology, China
Prof. Zhijie Zheng, Yunnan University, China
Prof. Xiaoping Wu, Naval University of Engineering, China
Prof. Hongqi Zhang, PLA Information Engineering University, China
Prof. Bogang Lin, Fuzhou University, China
Prof. Danlin Yao, National University of Defense Technology, China
Dr. Neal Xiong, Georgia State University, USA
Dr. Xinwen Zhang, Samsung R&D Center, USA

Publicaton Committee Chair:
Prof.Mengqi Zhou, IEEE China Council , China
Organizing Committee Chair:
Prof.Xinxin Niu, Beijing University of Posts and Telecommunications , China

[ICITIS2010]IEEE 2010 International Conference--call for papers

No comments: