登 录
註 冊
论坛
微波仿真网
注册
登录论坛可查看更多信息
微波仿真论坛
>
Academic Conference 学术会议
>
会议信息
>
2011 IEEE第三届网络安全、无线通信和 ..
发帖
回复
1308
阅读
0
回复
[
会议信息
]
2011 IEEE第三届网络安全、无线通信和可信计算国际会议-NSWCTC 2011 (EI Compendex/ISTP)
离线
power2010
UID :53405
注册:
2010-03-01
登录:
2011-06-16
发帖:
34
等级:
仿真新人
0楼
发表于: 2010-10-23 13:39:19
— 本帖被 casey 执行加亮操作(2011-12-07) —
The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing-NSWCTC2011
vl8Ums} +
(EI Compendex/ISTP)
y_:i'Ri.
2011 IEEE第三届网络安全、无线通信和可信计算国际会议-NSWCTC 2011 (EI Compendex/ISTP)
WhsTKy&E
4月23-24,2011,武汉,中国
'Jww}^h1
http://www.nswctc.org
{1.t ZCMT
0 V:z(r
Paper submission due: 10 December, 2010
F7wpGtt
Notification of paper acceptance: 31 December, 2010
EM+#h'%-
Final manuscript due: 8 January 2011
'-tiH
^<#08L;
Online submission system:
http://www.nswctc.org/submission.html
/ov&h;
X|)Ox ,(
The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC2011)
K)c`G_%G
serves as a forum for researchers, industry professionals, and academics interested in networks security,
pt&(c[
wireless communications and trusted computing, with the goal of fostering interaction. The conference was
j()<.h;'
sponsored and supported by Wuhan University, Huazhong University of Science and Technology, Research Association
ixZ w;+h
of Modern Education and Computer Science, Harbin Institute of Technology, IEEE Changsha Subsection. The
f\FubL
NSWCTC2011 Proceedings will be published by IEEE Computer Society's CPS, all papers accepted will be included in
Q=[AP+
IEEE Xplore, and arrange for indexing service(EI and ISTP). The best papers presented at the conference will be
SyFOf
selected for publications in special issues for NSWCTC 2011, which are indexed by SCI or EI.
.olDmFQD
Authors are invited to submit original unpublished manuscripts that demonstrate recent advances the following
Cvr?%+)$M
areas of interest, but are not limited to:
qh!2dj
E`3yf9"
Area 1: Networks Security
u;m[,
Intrusion Detection and Prevention
8r7~ >p~
Biometric Security and Artificial Intelligence
V8w!yc
Cryptography and security protocols
j'#M'W3@
Authentication and Identification
@bQf =N+
Bayesian Networks, Fuzzy and Rough Set
Z> jk\[
Mobile System Security
L,L>cmpM
Ubiquitous Computing Security
gf()NfUvRH
Sensor and Mobile Ad Hoc Network Security
RfVVAaI
Security in Wireless Network
`VT[YhO#}
Security of GSM/GPRS/UMTS systems
vq|o}6Et
Security for Grid Computing
#;?j]npg]
Security for Web Services
S+G!o]&2
Security for Personal Data and Databases
)'BuRN8
Peer-to-Peer Security
Ai&-W
Risk Assessment
B>}=x4-8
Forecasting Terrorism
mrR~[533j
Denial of Service and other attacks
&R:$h*Wt|
Management of Computing Security
s+;J`_M
Intelligent Multimedia Security Services
M}E0Msq_o
Knowledge Discovery and Data Mining
y#Je%tAe 2
E-commerce protocols
(5y+g?9d;
E-Health
:!a'N3o>
=Jd('r
Area 2: Wireless Communications
m0+X 109
UWB and Impulse Radio
-z9-f\
Channel Modeling and Characterization
'`$z!rA
Modulation/Coding/Signal Processing
C=&7V
B3G Systems, WiMAX and WLAN
vs-%J6}G
Advances in Wireless Video
hce *G@b
RFID Technologies
\M-}(>Pfk
Mobility and Handoff Management
]5X=u(}
Wireless/mobile networked Applications
u/3[6MIp
Multimedia in Wireless Ad-hoc Networks
@0cQ4}
Authentication, Authorization and Billing
1'wwwxe7
Location Based Services (LBS)
@Omgk=6
Applications and Services for B3G/4G era
IKx]?0sS
Radio Resource Management
RM8p[lfX
Networking and Systems
X#KC<BXw,
Wireless sensors networking
zyyt`
Network measurement and Management
^sR]w]cz.
Ad hoc and sensor networks
.'QE o
Multimedia QoS and traffic Management
eHUr!zH:
Internetworking of WLAN & Cellular Networks
dGf:0xE"
Network protocols for Mobile Networks
al<[iZ
#?/&H;n_8S
Area 3: Trusted Computing
Fdsaf[3[v
Semantics, Metrics and Models of Trust
E_-3G<rt
Trust Establishment, Propagation and Management
@giJ&3S,
Trusted Software and Database
Te=[tx~x
Trusted Computing Platform
#flOaRl.
Trusted operating system
@C]]VE
Trusted Network Computing
ns|)VX
Trusted Services and Applications
f$Fa*O-
Trust in E-commerce and E-government
$Fx:w
Trust in Mobil ..
II;fBcXF
}!=}g|z#|
未注册仅能浏览
部分内容
,查看
全部内容及附件
请先
登录
或
注册
共
1
条评分
hefang
rf币
+50
感谢您提供的资料,期待您继续分享!
2010-11-13
发帖
回复