The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing-NSWCTC2011 (EI Compendex/ISTP) - Q! i( b; @: |2011 IEEE第三届网络安全、无线通信和可信计算国际会议-NSWCTC 2011 (EI Compendex/ISTP) . F* r& M5 R& N$ ?4月23-24,2011,武汉,中国 + t# |: e7 ]; |! {http://www.nswctc.org 0 y/ H; C. E5 ~; P: \2 M7 v4 q1 W% | l2 K9 q( s- {# L" D
Paper submission due: 10 December, 2010 + i2 d- Z( z2 U6 C9 b
Notification of paper acceptance: 31 December, 2010 $ ~3 N& g3 H1 R/ E5 f2 p
Final manuscript due: 8 January 2011 u0 W% |+ m2 o) [. M5 d8 Q. b
# k. U( u ?9 c0 }7 S4 K- V5 a
Online submission system: http://www.nswctc.org/submission.html : u8 F0 c; u, q9 S5 k" V! [8 q 9 c0 g0 Y8 t8 N) O3 l3 nThe 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC2011) serves as a forum for researchers, industry professionals, and academics interested in networks security, wireless communications and trusted computing, with the goal of fostering interaction. The conference was sponsored and supported by Wuhan University, Huazhong University of Science and Technology, Research Association of Modern Education and Computer Science, Harbin Institute of Technology, IEEE Changsha Subsection. The NSWCTC2011 Proceedings will be published by IEEE Computer Society's CPS, all papers accepted will be included in IEEE Xplore, and arrange for indexing service(EI and ISTP). The best papers presented at the conference will be selected for publications in special issues for NSWCTC 2011, which are indexed by SCI or EI. 7 N% L: c, m# L! @
( _& V$ d0 S: C' d: Z, TAuthors are invited to submit original unpublished manuscripts that demonstrate recent advances the following areas of interest, but are not limited to: 3 {' |; G$ g9 V% X. ]Area 1: Networks Security $ h+ I: }1 L% i# e9 J- XIntrusion Detection and Prevention 6 ^& ~4 T& U1 A4 y& V, qBiometric Security and Artificial Intelligence 1 |+ I3 L8 J$ Y7 x6 F. sCryptography and security protocols4 v/ h# x- z" X& P8 [! F) Y
Authentication and Identification 2 Z C: f" r- s+ XBayesian Networks, Fuzzy and Rough Set W2 n$ S! X7 ?! Z' L2 U* v9 L2 p: G
Mobile System Security" N) c4 c4 Z* G
Ubiquitous Computing Security2 k9 n. O0 ~/ @
Sensor and Mobile Ad Hoc Network Security, p- T. Z6 @5 [+ E4 `& z+ E
Security in Wireless Network 8 U6 S" f: l- }4 K' [& aSecurity of GSM/GPRS/UMTS systems0 a: F/ U1 R+ x- |; \. y
Security for Grid Computing 7 P$ y* e/ l" I/ H8 T' I1 vSecurity for Web Services$ L& ? _: C. V8 [) M* Z
Security for Personal Data and Databases! w& O$ ^" e8 z/ [2 V
Peer-to-Peer Security9 V6 K9 H8 v5 m8 z5 q( C+ @
Risk Assessment; K( q3 d" M4 E; |' ], x
Forecasting Terrorism 0 B% ]; P" I3 o( a) W1 _Denial of Service and other attacks% x3 U; {2 E0 v+ t
Management of Computing Security 8 k7 X- u# }& y$ q3 ?$ s. EIntelligent Multimedia Security Services 8 U, t1 O/ ~, `8 g r6 F1 b- ^$ LKnowledge Discovery and Data Mining : S) |/ G" M; ^+ z, ~ [1 X( f6 LE-commerce protocols : i# q& t& t3 x8 h$ e+ k: nE-Health2 o2 X2 e1 B$ \: k
; z# w8 H0 X+ [- u
Area 2: Wireless Communications. Y0 G0 y& ^' F7 R* u+ @& c
UWB and Impulse Radio , b9 G- U& L% l" TChannel Modeling and Characterization ) g+ v% x5 L) p8 eModulation/Coding/Signal Processing5 E2 k( B! f# d( v# v/ V
B3G Systems, WiMAX and WLAN9 y- n5 s1 |# J7 r
Advances in Wireless Video : g$ J9 K0 x' N& S" I7 Y; GRFID Technologies* e0 H4 A# b# V# y# j3 s
Mobility and Handoff Management : ~; o$ V2 d# K* H g+ N' W' mWireless/mobile networked Applications / e# M$ t5 G( `" N" _, n/ iMultimedia in Wireless Ad-hoc Networks 6 k' ]7 R! ?% M) E1 sAuthentication, Authorization and Billing% O' h A# I3 c) K7 d( a
Location Based Services (LBS) 8 S f! m( ^( P6 C, Y" |Applications and Services for B3G/4G era$ F5 U' v0 ^9 Y" Q2 e4 E+ ^
Radio Resource Management 7 Q; K9 F8 |' |3 t) \+ DNetworking and Systems0 o* | i+ r2 z- p% q1 f* |& R4 H
Wireless sensors networking1 \8 o' J @$ P3 M
Network measurement and Management - F, N6 c+ G) y; o, g7 I% ?. uAd hoc and sensor networks 9 V( S: W- u3 _. N4 rMultimedia QoS and traffic Management% F O: y6 \3 J5 W+ [( M' ~+ r
Internetworking of WLAN & Cellular Networks 5 h, _5 i0 E( r* DNetwork protocols for Mobile Networks e5 ]4 R, H" \
* W1 q* ?% }5 n8 s3 |% cArea 3: Trusted Computing$ J; V. k9 B, P5 B1 c3 r. G( ^$ j$ m
Semantics, Metrics and Models of Trust # p* r* b$ z: ~Trust Establishment, Propagation and Management7 s% k$ l |3 F! r l
Trusted Software and Database + }. j5 {- ^8 z; ^. w% _Trusted Computing Platform) w q2 G& v( ~/ _0 F
Trusted operating system - i9 m0 ~1 K! jTrusted Network Computing- {* \6 A* ?! R. p8 m
Trusted Services and Applications8 Q! m; |; V! z+ U
Trust in E-commerce and E-government 6 K. i- i2 z# N2 b5 BTrust in Mobile and Wireless Networks! ]8 ^ D/ T# \- I& \
Reliable and Fault-tolerant Systems m2 N: }3 I' s) s' G
Survivable Systems& f8 T, t9 {* [( \- ]
Key Management' D0 x' h n3 {$ k3 g& l8 r