Scopes
Theme1 security management network security Encrypted communication Privacy protection risk assessment Wireless security Applied cryptography Applied cryptography Identity Access Management Infrastructure security Operating System Security Intellectual property protection Distributed System Security Cloud and edge computing security Available security and privacy Blockchain Security and Privacy Information Physical System Security Data and System Integrity Privacy protection data mining Internet of Things security and privacy Key management and key recovery Trusted computing and trusted computing Security protocols and authentication Software defined network security Mobile computing security and privacy Key management and key recovery Trusted computing and trusted computing Security models, standards, and policies Theme2 Optical network Sound source location Underwater communication wireless communication Blockchain integration Multimedia network distributed system Media Access Control Security scheme design The Application of Cryptography Technology Information system security radar signal processing Speech signal processing Intelligent signal processing Interference management and mitigation Integrated sensing and communication Introduction to Computer Security Encoding Theory and Applications Innovative Internet architecture Computer and Network Security Memory signal processing system MIMO based network Internet of Things/Information Physical Systems Adaptive equalization and echo cancellation Signal processing of mixed signal technology Attack methods for networks and computer systems Image, video, and multimedia signal processing