征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network employs a smart server that establishes a secure communication link with each of a plurality of smart client devices deployed on local client networks. Each smart client device is in communication with a plurality of agent devices. A plurality of remote devices can access the smart server directly and communicate with an agent device via the secure communication link between the smart server and one of the smart client devices. Some of the claimed and desired to be secured, Such thing can be described as follows like one or more of the agent devices are HTML compliant ,the server is located outside each of the local client networks and so on . Some of the Issues Affecting today’s Large Computer Networks such as Performance Degradation, Host Identification and Security Issues. These kind of issues, as broadly encompassing as they are, can be overwhelming for small- to mid-sized business to handle on their own. Leave it to IT Direct to help you design, deploy, and manage a large networking solution that’s right for your business. The main goal of this special issue is to provide therefore, it is intended that this invention not be limited to the particular implementation and method disclosed herein, but that the invention include all implementations falling within the scope of the appended claims.

征稿信息

重要日期

2017-05-02
初稿截稿日期
2017-06-12
初稿录用日期
2017-07-14
终稿截稿日期

征稿范围

Topics of interest include, but are not limited to the following:

  • Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks

  • Network Intrusion Detection and Prevention, Firewalls, Packet Filters

  • Web and Systems Security

  • Distributed Denial of Service Attacks and Defenses

  • Circumvention and Anti-Censorship Technologies

  • Security & Isolation in Cloud, Data Center and Software-Defined Networks

  • Authentication Systems: Public Key Infrastructures, Key Management, Credential     Management

  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs

  • Anonymization and privacy in communication systems

  • Biometric authentication and identity management

  • Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks

  • Availability of communications, survivability of networks in the presence of attacks

  • Key management and PKI for networks

  • Information-theoretic security

  • Security and privacy in cloud computing and federated cloud

  • Security and privacy in body area networks

  • Physical layer security methods, cross-layer methods for enhancing security

  • Secure routing, network management

  • Security and privacy in multi-hop wireless networks: ad hoc, mesh, sensor, vehicular and RFID networks

  • Usable security for networked computer systems

  • Vulnerability, exploitation tools, malware, botnet, DDoS attacks

  • Web, e-commerce, m-commerce, and e-mail security

  • Cognitive Radio Network

  •  5G, 4G, LTE, LTE-Advanced, WLAN, WPAN

  • Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    10月23日

    2017

    10月24日

    2017

  • 05月02日 2017

    初稿截稿日期

  • 06月12日 2017

    初稿录用通知日期

  • 07月14日 2017

    终稿截稿日期

  • 10月24日 2017

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询