2011 IEEE第三届网络安全、无线通信和可信计算国际会议-NSWCTC 2011 (EI Compende
<p><font face="Verdana">The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing-NSWCTC2011 </font><font face="Verdana">(EI Compendex/ISTP)<br/>2011 IEEE第三届网络安全、无线通信和可信计算国际会议-NSWCTC 2011 (EI Compendex/ISTP)<br/>4月23-24,2011,武汉,中国 <br/><a href="http://www.nswctc.org">http://www.nswctc.org</a></font></p><p> </p>
<p><font face="Verdana">Paper submission due: 10 December, 2010 <br/>Notification of paper acceptance: 31 December, 2010 <br/>Final manuscript due: 8 January 2011 </font></p>
<p> </p>
<p><font face="Verdana">Online submission system: <a href="http://www.nswctc.org/submission.html">http://www.nswctc.org/submission.html</a></font></p>
<p> </p>
<p><font face="Verdana">The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC2011) </font></p>
<p><font face="Verdana">serves as a forum for researchers, industry professionals, and academics interested in networks security, </font></p>
<p><font face="Verdana">wireless communications and trusted computing, with the goal of fostering interaction. The conference was </font></p>
<p><font face="Verdana">sponsored and supported by Wuhan University, Huazhong University of Science and Technology, Research Association </font></p>
<p><font face="Verdana">of Modern Education and Computer Science, Harbin Institute of Technology, IEEE Changsha Subsection. The </font></p>
<p><font face="Verdana">NSWCTC2011 Proceedings will be published by IEEE Computer Society's CPS, all papers accepted will be included in </font></p>
<p><font face="Verdana">IEEE Xplore, and arrange for indexing service(EI and ISTP). The best papers presented at the conference will be </font></p>
<p><font face="Verdana">selected for publications in special issues for NSWCTC 2011, which are indexed by SCI or EI. </font></p>
<p><font face="Verdana">Authors are invited to submit original unpublished manuscripts that demonstrate recent advances the following </font></p>
<p><font face="Verdana">areas of interest, but are not limited to:</font></p>
<p> </p>
<p><font face="Verdana">Area 1: Networks Security<br/>Intrusion Detection and Prevention <br/>Biometric Security and Artificial Intelligence<br/>Cryptography and security protocols<br/>Authentication and Identification<br/>Bayesian Networks, Fuzzy and Rough Set<br/>Mobile System Security<br/>Ubiquitous Computing Security<br/>Sensor and Mobile Ad Hoc Network Security<br/>Security in Wireless Network<br/>Security of GSM/GPRS/UMTS systems<br/>Security for Grid Computing<br/>Security for Web Services<br/>Security for Personal Data and Databases<br/>Peer-to-Peer Security<br/>Risk Assessment<br/>Forecasting Terrorism<br/>Denial of Service and other attacks<br/>Management of Computing Security<br/>Intelligent Multimedia Security Services<br/>Knowledge Discovery and Data Mining<br/>E-commerce protocols<br/>E-Health</font></p>
<p> </p>
<p><font face="Verdana">Area 2: Wireless Communications<br/>UWB and Impulse Radio<br/>Channel Modeling and Characterization<br/>Modulation/Coding/Signal Processing<br/>B3G Systems, WiMAX and WLAN<br/>Advances in Wireless Video<br/>RFID Technologies<br/>Mobility and Handoff Management<br/>Wireless/mobile networked Applications<br/>Multimedia in Wireless Ad-hoc Networks<br/>Authentication, Authorization and Billing<br/>Location Based Services (LBS)<br/>Applications and Services for B3G/4G era<br/>Radio Resource Management<br/>Networking and Systems<br/>Wireless sensors networking<br/>Network measurement and Management<br/>Ad hoc and sensor networks<br/>Multimedia QoS and traffic Management<br/>Internetworking of WLAN & Cellular Networks<br/>Network protocols for Mobile Networks</font></p>
<p><font face="Verdana">Area 3: Trusted Computing<br/>Semantics, Metrics and Models of Trust<br/>Trust Establishment, Propagation and Management<br/>Trusted Software and Database<br/>Trusted Computing Platform<br/>Trusted operating system<br/>Trusted Network Computing<br/>Trusted Services and Applications<br/>Trust in E-commerce and E-government<br/>Trust in Mobile and Wireless Networks<br/>Reliable and Fault-tolerant Systems<br/>Survivable Systems<br/>Key Management</font></p>
<p><font face="Verdana">= = = = = = = = = = = = = = = = = = = = = = = = = = = = <br/>The Secretary of NSWCTC 2011<br/>E-mail: nswctc2011@vip.sina.com, info@nswctc.org<br/>Phone: +86-15102769170<br/>= = = = = = = = = = = = = = = = = = = = = = = = = = = = <br/></font></p>
页:
[1]