Hello! This is
MICCIS 2023
+ 查看更多
International Conference on
Mobile Internet, Cloud Computing and Information Security
April 7-9, 2023 | Nanjing, China
Introduction
+ 查看更多
With the continuous development of science and technology, as well as the continuous penetration of information concept, China's communication industry is paying more and more attention to the application of science and technology and information concept, keeping up with the frontier position of information and communication development. In practice, the emergence of 4G mobile communication, Internet of Things and cloud computing has made the convergence service of cloud computing + Internet possible, which has provided a practical impetus for the development of current mobile communication.
Internet information technology is rapidly spreading and developing, enabling the Internet derivatives the basis of people's daily life and work. All aspects such as food, clothing, housing and transportation can be paid by scanning the QR code to make a deal. But the ensuing problems of authenticity, integrity and security of cyberspace data information have become the primary problem of Internet information security to overcome. The International Conference on Mobile Internet, Cloud Computing and Information Security 2023 (MICCIS 2023) will be held in Nanjing, April 7-9, 2023. The conference will provide an international platform for experts, professors, scholars and engineers from universities, research institutes, enterprises and institutions at home and abroad to share their professional experiences, expand their professional networks, exchange new ideas and present their research results. Key challenges and research directions for the development of the field will be discussed, business or research contacts will be established, and global partners will be sought for future business.
Key Dates
+ 查看更多
Opening Date for Paper Submissions: August 1, 2022
Closing Date for Paper Submission: February 14, 2023
Notification of Paper Acceptance or Rejection: March 16, 2023
Full Paper Submission Due: May 5, 2023
Registration Deadline: March 26, 2023
Conference Date: Nanjing China: April 7-9, 2023
Call for Papers
+ 查看更多
1. Mobile Internet
+ 查看更多
Mobile Applications
Mobile Transactions
Mobile Payments
Mobile Marketing
Mobile Authentication
Mobile Security
Mobile Terminal
Mobile Network
Mobile Communication
Mobile Operating System
Mobile Browser
Mobile Instant Messaging
Mobile Data
Mobile Search
Mobile Games
Mobile Map
Mobile Social Networking
Mobile Government
Mobile Education
Mobile Healthcare
Mobile Reading
Mobile Business Law
Mobile Cloud
Mobile IoT
Service Computing
Service Reputation
Collaborative Computing
Peer-to-Peer Computing
Business Intelligence
Knowledge Management
Complex Systems
Embedded Systems
Sensor Networks
Smart Home
Smart City
2. Cloud Computing
+ 查看更多
Cloud and Grid Computing for Big Data
Cloud Application Architectures
Cloud Application Scalability and Availability
Cloud Application Performance and Monitoring
Cloud Computing and Semantic Web Technology
Cloud Computing Architectures and Systems
Models and Tools for Intelligent Computing
Cloud Computing Technologies, Services, and Applications
Cloud for Enterprise Business Transformation Cloud Management and Operations
Cloud Middleware Frameworks
Cloud Optimization and Automation
Cloud Quality and Performance
Cloud Resource Virtualization and Combination
Cloud Solution Design Patterns
Cloud Solution Design Patterns
Distributed and Peer-to-peer Search
Infrastructure and Platforms for Intelligent Computing
Cloud Computing Models, Simulations, Designs, and Examples
3. Information Security
+ 查看更多
Access Control
Secure Cloud Computing
Secure Cloud Computing
Artificial Immune System
Security and Network Management
Authentication
Security and Privacy in Mobile Systems
Authentication and Non-Repudiation
Security and Privacy in Pervasive Computing
Biometric Security
Security and Privacy in Web Services
Secure Computing Intelligence
Security and Privacy Policies
Encryption Protocols
Security Zone Control
Data Integrity
Security Deployment
Database and System Security
Security Engineering
Security in Distributed Systems
Design and Security ModelsSecurity of Grid Computing
Email Security, Spam, Phishing and Email Fraud
Security of Information System Architectures
Encryption and Decryption Algorithms
Security of Intelligent Agents and Systems
Formal Authentication Tools
Security of Pervasive Computing Security of Fuzzy Systems
Security of Web 2.0
Identification and Authentication
Security Management
Insider Threats and Countermeasures
Security of Software Defined Networks
Internet Security and Applications
Security of Vehicle Networks
Intrusion Detection and Prevention
Security Requirements
Key Management
Security Threats and Countermeasures
Mobile adhoc Network Security
Sensor Network Security
Authentication, Trust and Authorization Model
Software Security
Peer-to-peer Network SecurityThreats, Vulnerabilities, Risks, Formal Methods
Performance Evaluation of Security ProtocolsTrust Management
Privacy and AuthenticationTrust models and metrics
QoS Cybersecurity
Virus, Worm, and Trojan Horse Protection
Quantum Cryptography Vulnerability Assessment
Regulatory and Trust Mechanisms
Wireless network security
DDoS, MiM, Session Hijacking and Replay Attacks
Latest News
+ 查看更多
Publication:
All the articles that are submitted to MICCIS and accepted by peer review will be published by CPS in a conference proceeding.

Links:
Conference Logo: http://www.miccis.org/?attachment_id=18266&download=1