| |||||||||||||||
ICINS 2014 : 2014 2nd International Conference on Information and Network Security | |||||||||||||||
Link: http://www.icinsconf.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 2014 International Conference on Information and Network Security (ICINS 2014) will be held in Beijing, China, 14th-16th November 2014. Recent advances of information and network technologies hasten the demand of secure processing, storing, and sharing information in electronic environments. The awareness of information and network security should be utilized for improving the network-wised security. Researchers and engineers are invited to interact and disseminate information on the latest developments in information and network security. ICINS 2014 solicits original, unpublished contributions in all aspects of information and network security. Works validated by experimentation, simulation or analysis are particularly encouraged. Practical experiences and experimental works from both industry and academia are also welcome. Submitted manuscripts should be written in English and must not be concurrently considered elsewhere for publication.
All accepted paper will be reviewed by the IET in consideration for publication. Those that meet the expected levels of quality and technical content will be accepted for publication on the IET Digital Library and IEEE Xplore, indexed by IET Inspec and submitted to EI Compendex for consideration for indexing. The Proceedings of ICINS2013 have been included in the IEEE Xplore! http://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&queryText=ICINS+2013 The Topics of interest include, but are not limited to: Information Security Network Security Cryptography Digital Rights Management Digital Content Security Steganography and Steganalysis Information Hiding and Watermarking Big Data Privacy and Security Networks Convergence and Security System Security Database Security Mobile Network Security Software Security and Protection Electronic Commerce Security Security Issues in Internet of Things Cloud Computing and Cloud Security Data Mining and Privacy Protection Trusted Computing and Trust System Important Dates Submission Deadline: Oct. 10th, 2014 Notification of Acceptance: Oct. 25th, 2014 Conference Date: Nov. 14th-16th, 2014 Contact us E-mail: icins2014@gmail.com |
|