| 学界大牛 | 助推学术 | 致辞致谢感言 | 论文撰写与演讲 | 协同中心 | 学术期刊 | 研究群体 | 学术搜索 | 学术软硬件 | 学术会议 | 学术论坛 | 科普展览 |
您当前的位置:首页 > 科技人生 > 学术会议

2011 International Conference on Information Theory and Information Security(ICITIS2011)

时间:2011-02-25 15:52:07  来源:  作者:

Sponsors

IEEE Beijing Section

IEEE Nanjing Section

Technical Co-Sponsors

Zhejiang University of Technology

Beijing University of Posts and Telecommunications

China Institute of Communications

Chinese Institute of Electronics

China Association for Artificial Intelligence

Organizers

Information Security Center, Beijing University of Posts and Telecommunications

Zhejiang Provincial Key Laboratory of Fiber Optic Communication Technology

National Key Laboratory of Science and Technology on Information System Security

 

·         InternetInformation and Communication Security

·         Channel and source coding

·         Communication theory and systems

·         Information theory and statistics

·         Quantum information theory

·         Network coding

·         Accountability economics of security and privacy

·         Anonymity and pseudonymity      

·         Security in IT outsourcing

·         Authentication

·         Security of grid computing

·         Computer forensics

·         Security of eCommerce

·         Information hiding and watermarking

·         Database security

·         Peer-to-peer security

·         Security models for ambient intelligence environments

·         Security and privacy in pervasive/ubiquitous computing

·         Coding theory and practice

·         Emerging applications of information theory

·         Network and multi-user information theory

·         Signal processing

·         Access control

·         Security in information flow

·         Electronic frauds

·         Applied cryptography

·         Identity management

·         Information dissemination control

·         The Internet of Things and Applications

·         eBusiness and eGovernment

·         Wireless Communications and Signal Processing

·         Security modeling and architectures

·         Trust models and trust management policies

·         The Internet of Things and Applications

CONTACT INFORMATION

Website: http://www.iicitis.org/

Email:  icitis2011@leaderstudio.net

来顶一下
返回首页
返回首页
发表评论 共有条评论
用户名: 密码:
验证码: 匿名发表
推荐资讯
相关文章
栏目更新
栏目热门