{"id":11691,"date":"2014-03-20T21:05:51","date_gmt":"2014-03-20T19:05:51","guid":{"rendered":"http:\/\/hgpu.org\/?p=11691"},"modified":"2016-12-04T12:29:47","modified_gmt":"2016-12-04T10:29:47","slug":"2014-international-conference-on-networks-and-information-security-icnis-2014","status":"publish","type":"post","link":"https:\/\/hgpu.org\/?p=11691","title":{"rendered":"2014 International conference on Networks and Information Security, ICNIS 2014"},"content":{"rendered":"<p>2014-08-20<\/p>\n<p>The papers accepted by ICNIS 2014 will be published in Journal of Advances in Computer Networks (JACN; ISSN: 1793-8244), which will be included in Engineering &amp; Technology Digital Library, EBSCO, DOAJ, Electronic Journals Library, Ulrich&#8217;s Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar.<\/p>\n<p>Access control<br \/>\nAnti-malware<br \/>\nAnonymity<br \/>\nApplied cryptography<br \/>\nAuthentication and authorization<br \/>\nBiometric security<br \/>\nData and system integrity<br \/>\nDatabase security<br \/>\nDistributed systems security<br \/>\nElectronic commerce<br \/>\nFraud control<br \/>\nGrid security<br \/>\nInformation hiding and watermarking<br \/>\nIntellectual property protection<br \/>\nIntrusion detection<br \/>\nKey management and key recovery<br \/>\nLanguage-based security<br \/>\nOperating system security<br \/>\nNetwork security<br \/>\nRisk evaluation and security certification<br \/>\nSecurity for mobile computing<br \/>\nSecurity models<br \/>\nSecurity protocols<br \/>\nTrusted computing<br \/>\nComputer Networks<br \/>\nComputer Networking<br \/>\nMobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks<br \/>\nRadio Wave Propagation (modelling, channel measurements and characterisation)<br \/>\nSoftware Defined Radio<br \/>\nApplication of FPGA and DSP in Communication Devices and Networks<br \/>\nAd-hoc Networks<br \/>\nSignal Processing for Wireless Communications<br \/>\nModulation, Coding and Multiple Access Schemes in Communications<br \/>\nInternet and Intranet Technologies and Services<br \/>\nIntelligent Spatial and Co-located Data Access and Management<br \/>\nInformation Theory and Coding Theory<br \/>\nNetworking Theory and Technologies<br \/>\nAntennas Simulation, Design, Measurements and Applications<br \/>\nMicrowave (RF) System Simulations, Design, Build and Measurements<br \/>\nNetwork and Data Security<br \/>\nHardware and Software Applications<br \/>\nCommunication Protocols and Standards<br \/>\nUniversity-Industry Collaboration or Knowledge Transfer Activities<br \/>\nNetwork Architecture<br \/>\nNetwork Interfaces<br \/>\nNetwork Reliability<br \/>\nNetwork Performance<br \/>\nNetwork Management<br \/>\nNetwork protocols<br \/>\nQuality Service Issues<br \/>\nWireless Protocol, Architecture and Design Concerns<br \/>\nAdhoc Networks<br \/>\nHeterogeneous Networks<br \/>\nHigh Performance Network Protocol<br \/>\nServices and Interconnection of High Speed Networks<br \/>\nMethodologies and development for high speed Network<br \/>\nPerformance in High Speed Network<br \/>\nVoIP Blue tooth Technology<br \/>\nBroadband Access Control<br \/>\nWireless Access Control<br \/>\nSecurity Issues<br \/>\nCryptography<br \/>\nNetwork Security<br \/>\nWireless Network Security<br \/>\nInformation Hiding, Stegnography, Watermarking<br \/>\nSecurity in High speed network<br \/>\nBiometrics<br \/>\nIdentification and trust Methodology<br \/>\nForensic<br \/>\nPeer to Peer Security<br \/>\nNetwork intrusion, detection and prevention<\/p>\n<p>via: icnis@iacsit.net (.pdf\/.doc)<\/p>\n<p>Ms. Joice Deng,<br \/>\nTel: +86-28-8652-7868<br \/>\nE-mail: icnis@iacsit.net<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2014-08-20 The papers accepted by ICNIS 2014 will be published in Journal of Advances in Computer Networks (JACN; ISSN: 1793-8244), which will be included in Engineering &amp; Technology Digital Library, EBSCO, DOAJ, Electronic Journals Library, Ulrich&#8217;s Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar. Access control Anti-malware Anonymity Applied cryptography Authentication [&hellip;]<\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[86],"tags":[],"class_list":["post-11691","post","type-post","status-publish","format-standard","hentry","category-events"],"views":1879,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/11691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11691"}],"version-history":[{"count":2,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/11691\/revisions"}],"predecessor-version":[{"id":11698,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/11691\/revisions\/11698"}],"wp:attachment":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}