2010 IEEE International Conference on Information Theory and Information
Security (ICITIS 2010)
Dec. 17~19, 2010 in Beijing, China
URL: http://www.leaderstudio.net/icitis/index.html
ICITIS2010 aims to provide an international forum for researchers to
present and discuss recent advances and novel techniques in information
theory and information security. Original, previously unpublished papers
and research contributions are invited. Late-breaking results and early
stage research are heartily encouraged. Paper submissions will be
handled electronically in the ICITIS2010 submission web site. Authors of
accepted papers will need to sign an IEEE copyright release form and
present their papers at ICITIS2010. All papers accepted will be included
in the IEEE Xplore Digital Library and submitted for indexing by Ei
Compendex and ISTP..
Selected best papers will be expanded and revised, as required, for the
Journal Special Issues of < China Communications >(indexed by SCIE).
Best Student Papers award will be granted at ICITIS2010. The first
author of the best student paper must be a full-time student..
TOPICS of interest include, but are not limited to, the following:.
.Channel and source coding
.Coding theory and practice
.Communication theory and systems
.Emerging applications of information theory
.Information theory and statistics
.Network and multi-user information theory
.Quantum information theory
.Signal processing
.Network coding
.Access control
.Digital right management
.Security and privacy in pervasive/ubiquitous computing
.Accountability economics of security and privacy
.Security in information flow
.Anonymity and pseudonymity
.Electronic frauds
.Security in IT outsourcing
.Applied cryptography
.Authentication
.Identity management
.Security of grid computing
.Information dissemination control
.Computer forensics
.Intrusion detection
.Security of eCommerce
.eBusiness and eGovernment
.Network security
.Information hiding and watermarking
.Security models for ambient intelligence environments
.Database security
.Security modeling and architectures
.Peer-to-peer security
.Trust Models and trust management policies
Further information:
http://www.leaderstudio.net/icitis/doc/CallForPapers(ICITIS2010).pdf
--------------------------------------------------------------------------------
IMPORTANT DATES
--------------------------------------------------------------------------------
Paper Submission Deadline: Aug. 30, 2010 .
Acceptance Notification : Nov. 15, 2010 .
Camera-Ready Copy Due : Nov. 30, 2010 .
Conference Date : Dec. 17-19, 2010 ..
--------------------------------------------------------------------------------
ORGANIZATION COMMITTEE
--------------------------------------------------------------------------------
General Co-Chairs:
Yixian Yang, Beijing University of Posts and Telecommunications , China .
Shuoyan Li, Chinese University of Hong Kong , Hong Kong , China .
Fuji Ren, Tokushima University, Japan.
Program Committee Co-Chairs:
Pingzhi Fan, Southwest Jiaotong University, China .
Dongfeng Yuan, Shandong University , China
Program Committee: http://www.leaderstudio.net/icitis/committees.html
------------------------------------------------------------
CONTACT
------------------------------------------------------------
For further information regarding ICITIS 2010 and paper submission,
please contact ICITIS@bupt.edu.cn
Best regards,
Yixian Yang, Shuoyan Li, Fuji Ren.
(ICITIS 2010 General Co-Chairs)
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment