登 录
註 冊
论坛
微波仿真网
注册
登录论坛可查看更多信息
微波仿真论坛
>
Academic Conference 学术会议
>
会议信息
>
2011 IEEE第三届网络安全、无线通信和 ..
发帖
回复
1307
阅读
0
回复
[
会议信息
]
2011 IEEE第三届网络安全、无线通信和可信计算国际会议-NSWCTC 2011 (EI Compendex/ISTP)
离线
power2010
UID :53405
注册:
2010-03-01
登录:
2011-06-16
发帖:
34
等级:
仿真新人
0楼
发表于: 2010-10-23 13:39:19
— 本帖被 casey 执行加亮操作(2011-12-07) —
The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing-NSWCTC2011
/EwNMU*6
(EI Compendex/ISTP)
BX2}ar
2011 IEEE第三届网络安全、无线通信和可信计算国际会议-NSWCTC 2011 (EI Compendex/ISTP)
<o@__l.
4月23-24,2011,武汉,中国
`m\ ?gsw7
http://www.nswctc.org
3A3WD+[L
c#a>> V
Paper submission due: 10 December, 2010
W 7w*VD|
Notification of paper acceptance: 31 December, 2010
Efu/v<
Final manuscript due: 8 January 2011
IeB^BD+j
wvH*<,8Vq
Online submission system:
http://www.nswctc.org/submission.html
<q=]n%nX
F 7X] h
The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC2011)
6\x/Z=}L
serves as a forum for researchers, industry professionals, and academics interested in networks security,
[pz1f!Wn
wireless communications and trusted computing, with the goal of fostering interaction. The conference was
q5.5%W
sponsored and supported by Wuhan University, Huazhong University of Science and Technology, Research Association
*enT2Q
of Modern Education and Computer Science, Harbin Institute of Technology, IEEE Changsha Subsection. The
UZo[]$"Q`
NSWCTC2011 Proceedings will be published by IEEE Computer Society's CPS, all papers accepted will be included in
US&:UzI.
IEEE Xplore, and arrange for indexing service(EI and ISTP). The best papers presented at the conference will be
5G=fJAG
selected for publications in special issues for NSWCTC 2011, which are indexed by SCI or EI.
|al'_s}I
Authors are invited to submit original unpublished manuscripts that demonstrate recent advances the following
nr%P11U\c
areas of interest, but are not limited to:
MX7$f (Hy
'E cd\p
Area 1: Networks Security
E :UJ"6
Intrusion Detection and Prevention
`)M&^Z=D
Biometric Security and Artificial Intelligence
VW:Voc
Cryptography and security protocols
XXb,*u 3
Authentication and Identification
Hm_&``='
Bayesian Networks, Fuzzy and Rough Set
k!!d2y6
Mobile System Security
&zHY0fxX
Ubiquitous Computing Security
L7N>p4h]Xj
Sensor and Mobile Ad Hoc Network Security
tw<}7l_>Au
Security in Wireless Network
#^w8Y'{?
Security of GSM/GPRS/UMTS systems
>ajcfG.k(
Security for Grid Computing
1t7T\~+F
Security for Web Services
*s!T$oc
Security for Personal Data and Databases
;MW=F9U*
Peer-to-Peer Security
DK<}q1xi
Risk Assessment
qR^+K@*|
Forecasting Terrorism
GX N:=
Denial of Service and other attacks
fAD {sg
Management of Computing Security
M2M&L,/O
Intelligent Multimedia Security Services
J:\O .F#Fi
Knowledge Discovery and Data Mining
1(/rg
E-commerce protocols
q ;e/gP2
E-Health
c/,B ?
!~]'&9
Area 2: Wireless Communications
Gk)6ljL
UWB and Impulse Radio
YGZa##i
Channel Modeling and Characterization
IDp2#qg_
Modulation/Coding/Signal Processing
#3YYE5cB
B3G Systems, WiMAX and WLAN
:(i=> ~O
Advances in Wireless Video
SKVQ !^o
RFID Technologies
\ZC0bHsA
Mobility and Handoff Management
Z`ZML+;~6
Wireless/mobile networked Applications
7qg. :h
Multimedia in Wireless Ad-hoc Networks
Pa/2]) w
Authentication, Authorization and Billing
Jg@eGs\*
Location Based Services (LBS)
2l +t-
Applications and Services for B3G/4G era
20 )8e!jP
Radio Resource Management
tA-p!#V<k1
Networking and Systems
RY~mQ
Wireless sensors networking
4iJ4g% ]
Network measurement and Management
`Wu.wx
Ad hoc and sensor networks
Jy0(g T
Multimedia QoS and traffic Management
}5y]kn
Internetworking of WLAN & Cellular Networks
D`PA@t
Network protocols for Mobile Networks
<^adt *m
mnM$#%q;%
Area 3: Trusted Computing
R'aA\k-
Semantics, Metrics and Models of Trust
5-"aK~@+
Trust Establishment, Propagation and Management
u7 {R; QKw
Trusted Software and Database
m"vWu0/#
Trusted Computing Platform
uD4$<rSHb
Trusted operating system
%Pk@`t (3
Trusted Network Computing
u@kr;^m
Trusted Services and Applications
Ki%RSW(_`
Trust in E-commerce and E-government
27UnH: =
Trust in Mobil ..
5I0j>{U&
CjU?3Ag
未注册仅能浏览
部分内容
,查看
全部内容及附件
请先
登录
或
注册
共
1
条评分
hefang
rf币
+50
感谢您提供的资料,期待您继续分享!
2010-11-13
发帖
回复