CRC-UC-B-2022: Ubiquitous and Transparent Security: Challenges and Applications |
Submission link | https://easychair.org/conferences/?conf=crcucb2022 |
Abstract registration deadline | August 25, 2022 |
Submission deadline | November 25, 2022 |
Submission Guidelines
This book fully focus on significant difficulties in the field of Ubiquitous and transparent security for challenges and applications. The book ‘s goal is to provide a sampling of recent advanced and ideas on the progress of research and the practical application of computational intelligence techniques in addressing ubiquitous and transparent security challenges and issues, in order for its value to be realized both practically and scientifically.
Submission Guidelines Link:
https://www.routledge.com/rsc/downloads/Page_16_-_Guidelines_for_Chapter_Contributors.pdf?utm_source=Promotional%2520Ebook&utm_medium=Ebook&utm_term=Page_16_-_Guidelines_for_Chapter_Contributors.pdf&utm_campaign=KE35179
All Chapters must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:.
List of Topics
Table of Contents
- A road to ubiquitous computing: history, development, and scenarios
- Ubiquitous computing: Radio Frequency Identification in action
- RFID based wireless networks: security and privacy in ubiquitous computing
- RFID technology in supply chain management: A way to security and reliability approaches
- Assimilation of ambient information systems and intelligence - design and evaluation challenges
- Hybrid architecture of context-aware middleware management for ubiquitous computing
- An impact of ubiquitous computing on heterogeneous next generation networks
- Routing and security issues for business applications and network technologies using ubiquitous computing
- Integration of Cloud computing and Pervasive computing: A potential solution to bridge the gap between employee surveillance and privacy protection
- Analysis and safeguarding of privacy threats in emerging ubiquitous computing applications with big data in the workplace
- A real-time simulation model for pervasive and multimodal interactive systems
- Opportunities and future challenges for planning of knowledge cities in ubiquitous technology space.
- Security architecture equipped with protocols for ubiquitous networks
- A review on potential possibilities, problems, and pitfalls of mobile and pervasive technology in education and training
- Artificial intelligence based pervasive computing model for healthcare management systems.
- Intelligent agent framework for secure patient-doctor modelling systems.
Contact
All questions about submissions should be emailed to suresh79.slm@gmail.com