| 查看: 557 | 回复: 0 | |||
[交流]
2010年信息论与信息安全国际会议(ICITIS 2010)怎么样啊
|
|
最近看到一个会议,快截止了,这个会怎么样啊,怕被骗啊 2010年信息论与信息安全国际会议(ICITIS 2010) http://www.leaderstudio.net 2010年12月17~19日,中国北京 2010年信息论与信息安全国际会议(ICITIS 2010)将于12月17-19日在北京召开。本次会议由IEEE北京分会主办,北京邮电大学信息安全中心承办。ICITIS2010将为全球计算机科学与信息安全研究人员和实际工作者提供公布新发现和探讨新方法的平台。 本次会议论文集将被Ei和ISTP检索,并进入IEEE Xplore。优秀论文将推荐至《China communication》(SCIE检索)和 IGI group- International Journal of Digital Crime and Forensics (ISSN:1941-6210). 国外投稿版面费和会议费全免 。 征文要求:只接受英文稿件 重要日期: 论文提交截止日期: 8月30日 论文接收通知时间: 11月15日 预注册交费截止时间: 11月30日 大会及观光旅游: 12月17~19日 会议网址:http://www.iicitis.org/ 邮箱: icitis@leaderstudio.net Sponsor IEEE Section Beijing Co-Sponsor Beijing University of Posts and Telecommunications Organizer Information Security Center, Beijing University of Posts and Telecommunications Technical Co-Sponsor Chinese Institute of Electronics 2010 IEEE International Conference on Information Theory and Information Security(ICITIS2010) aims to provide an international forum for researchers to present and discuss recent advances and novel techniques in information theory and information security. Original, previously unpublished papers and research contributions are invited. Late-breaking results and early stage research are heartily encouraged. Paper submissions will be handled electronically in the ICITIS2010 submission web site. Authors of accepted papers will need to sign an IEEE copyright release form and present their papers at ICITIS2010. All papers accepted will be included in the IEEE Xplore Digital Library and submitted for indexing by Ei Compendex and ISTP. Foreign contributors are all free。 Selected best papers will be expanded and revised, as required, for the Journal Special Issues of China Communications>(indexed by SCIE). Best Student Papers award will be granted at ICITIS2010. The first author of the best student paper must be a full-time student. TOPICS of interest include, but are not limited to, the following: Channel and source coding Coding theory and practice Communication theory and systems Emerging applications of information theory Information theory and statistics Network and multi-user information theory Quantum information theory Signal processing Network coding Access control Accountability economics of security and privacy Security in information flow Anonymity and pseudonymity Electronic frauds Security in IT outsourcing Applied cryptography Authentication Identity management Security of grid computing Information dissemination control Computer forensics Intrusion detection Security of eCommerce eBusiness and eGovernment Information hiding and watermarking Digital right management Database security Security modeling and architectures Peer-to-peer security Trust models and trust management policies Security models for ambient intelligence environments and privacy in pervasive/ubiquitous computing IMPORTANT DATES Paper Submission Deadline: Aug. 30, 2010 Acceptance Notification: Nov. 15, 2010 Camera-Ready Copy Due: Nov. 30, 2010 Conference Date: Dec. 17-19, 2010 CONTACT INFORMATION Website: www.leaderstudio.net E-mail: icitis@leaderstudio.net 会议时间 2010-12-17 至2010-12-19 会议地点 北京 主办单位 IEEE北京分会 icitis@leaderstudio.net 会议规模 100人以上 会议网址 www.leaderstudio.net 本文来自: 小木虫论坛 http://muchong.com/bbs/viewthread.php?tid=2310579 本文来自: 小木虫论坛 http://muchong.com/bbs/viewthread.php?tid=2310579 本文来自: 小木虫论坛 http://muchong.com/bbs/viewthread.php?tid=2310579 |
» 猜你喜欢
有没有人能给点建议
已经有5人回复
假如你的研究生提出不合理要求
已经有12人回复
实验室接单子
已经有7人回复
全日制(定向)博士
已经有5人回复
萌生出自己或许不适合搞科研的想法,现在跑or等等看?
已经有4人回复
Materials Today Chemistry审稿周期
已经有4人回复
参与限项
已经有3人回复
对氯苯硼酸纯化
已经有3人回复
所感
已经有4人回复
要不要辞职读博?
已经有7人回复
找到一些相关的精华帖子,希望有用哦~
科研从小木虫开始,人人为我,我为人人












回复此楼
点击这里搜索更多相关资源