Topics:<br>Communications, Information and Network Security<br>Access control<br>Anti–malware<br>Anonymity<br>Applied cryptography<br>Authentication and authorization<br>Biometric security<br>Data and system integrity<br>Database security<br>Distributed systems security<br>Electronic commerce<br>Fraud control<br>Grid security<br>Information hiding and watermarking<br>Intellectual property protection<br>Intrusion detection<br>Key management and key recovery<br>Language–based security<br>Operating system security<br>Network security<br>Risk evaluation and security certification<br>Security for mobile computing<br>Security models<br>Security protocols<br>Trusted computing<br>Computer Networks<br>Computer Networking<br>Mobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks<br>Radio Wave Propagation (modelling, channel measurements and characterisation)<br>Software Defined Radio<br>Application of FPGA and DSP in Communication Devices and Networks<br>Ad–hoc Networks<br>Signal Processing for Wireless Communications<br>Modulation, Coding and Multiple Access Schemes in Communications<br>Internet and Intranet Technologies and Services<br>Intelligent Spatial and Co–located Data Access and Management<br>Information Theory and Coding Theory<br>Networking Theory and Technologies<br>Antennas Simulation, Design, Measurements and Applications<br>Microwave (RF) System Simulations, Design, Build and Measurements<br>Network and Data Security<br>Hardware and Software Applications<br>Communication Protocols and Standards<br>University–Industry Collaboration or Knowledge Transfer Activities<br>Network Architecture<br>Network Interfaces<br>Network Reliability<br>Network Performance<br>Network Management<br>Network protocols<br>Quality Service Issues<br>Wireless Protocol, Architecture and Design Concerns<br>Adhoc Networks<br>Heterogeneous Networks<br>High Performance Network Protocol<br>Services and Interconnection of High Speed Networks<br>Methodologies and development for high speed Network<br>Performance in High Speed Network<br>VoIP Blue tooth Technology<br>Broadband Access Control<br>Wireless Access Control<br>Security Issues<br>Cryptography<br>Network Security<br>Wireless Network Security<br>Information Hiding, Stegnography, Watermarking<br>Security in High speed network<br>Biometrics<br>Identification and trust Methodology<br>Forensic<br>Peer to Peer Security<br>Network intrusion, detection and prevention<br>For more topics: http://www.icnis.org/cfp.html<br>
Abbrevation
ICNIS
City
Singapore
Country
Singapore
Deadline Paper
Start Date
End Date
Abstract