<p class="MsoNormal"><span lang="EN-US">Dear Author, </span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal" align="center" style="text-align:center"><span lang="EN-US">*******Our
apologies if you receive multiple copies of this announcement *******</span></p>
<p class="MsoNormal"><span lang="EN-US">----------------------------------------------------------------------------------------------------------------------</span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes"> </span>The
7th International Conference on Computational Intelligence and Security
(CIS'2011)</span></p>
<p class="MsoNormal"><span lang="EN-US">----------------------------------------------------------------------------------------------------------------------</span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes"> </span>3-4, December, 2011, Sanya, China</span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes"> </span>*** Important Dates of
CIS2011***</span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes">
</span></span><span style="font-family:宋体;mso-ascii-font-family:"Times New Roman";
mso-hansi-font-family:"Times New Roman"">●</span><span lang="EN-US"><span style="mso-spacerun:yes"> </span><b style="mso-bidi-font-weight:normal">Submission
of Papers: <span style="color:red">July 30, 2011 (Extended Due Date)</span></b></span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes">
</span></span><span style="font-family:宋体;mso-ascii-font-family:"Times New Roman";
mso-hansi-font-family:"Times New Roman"">●</span><span lang="EN-US"><span style="mso-spacerun:yes"> </span>Notification of Acceptance: August 10, 2011</span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes">
</span></span><span style="font-family:宋体;mso-ascii-font-family:"Times New Roman";
mso-hansi-font-family:"Times New Roman"">●</span><span lang="EN-US"><span style="mso-spacerun:yes"> </span>Final Camera-Ready Papers: August 30, 2011</span></p>
<p class="MsoNormal" style="text-indent:5.25pt;mso-char-indent-count:.5"><span lang="EN-US"><span style="mso-spacerun:yes">
</span>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes"> </span>Conference Website: <a href="http://www.cis-lab.org/">http://www.cis-lab.org/</a></span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes">
</span>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes">
</span>International Conference on Computational Intelligence and Security
(CIS) is a major annual international conference to bring together researchers,
engineers, developers and practitioners from academia and industry working in
all areas of two crucial fields in information processing: computational
intelligence (CI) and information security (IS), to share the experience, and
exchange and cross-fertilize ideas. In particular, the series of CIS conference
provides an ideal platform to explore the potential applications of CI models,
algorithms and technologies to IS. </span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes">
</span>Following the great success of CIS'2005-2010, the seventh conference
CIS'2011 serves as a forum for the dissemination of state-of-the-art research,
development, and implementations of systems, technologies and applications in
these two broad fields. CIS'2011 is co-organized by Hainan Association of
Computing Machinery and Guangdong University of Technology. Also, it is
co-sponsored by Xidian University and Beijing Nomal
University. CIS'2011 will
be held in Sanya, Hainan Province,
China on
December 3-4, 2011.</span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes"> </span></span></p>
<p class="MsoNormal"><span lang="EN-US"><span style="mso-spacerun:yes">
</span>Prospective authors are invited to submit high-quality manuscripts
written in English. The submission of a paper implies that the paper is
original and has not been submitted to elsewhere for possible publication. All
submissions will be blindly reviewed by experts in the field based on
originality, significance, quality and clarity. Authors must not reveal any
author information in the submitted paper(s), otherwise the paper(s) will be
rejected immediately without going through the reviewing process. Authors
should use the Latex style files or MS-Word templates provided by the CPS to
format their papers. The length of a submitted paper should not exceed 5 pages
in two-column format. The accepted papers will be included in the conference
proceedings published by the Conference Publishing Services (CPS), and be further
submitted to the indexing companies for possible indexing, including EI and
ISTP. Nevertheless, all past CIS'2005-CIS'2010 proceedings have been
successfully indexed in EI, and it is expected that the publication and
indexing process of CIS'11 remain the same as in the past. </span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal" style="text-indent:21.0pt;mso-char-indent-count:2.0"><span lang="EN-US">The accepted papers will be further selected based on its
originality and technical quality, and significantly expanded and included in
several Special Issues of the International Journals (EI or SCI indexed).</span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US">The main topics (research interests) of the
conference include but are not limited to:<span style="mso-spacerun:yes">
</span></span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal" style="margin-left:69.0pt;text-indent:-21.0pt;mso-list:l1 level1 lfo1;
tab-stops:list 69.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">l<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Computational Intelligence (Models, Theories and Algorithms)</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Artificial Immune Systems</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Autonomy-Oriented Computing</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Artificial Neural Systems</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Bayesian Learning</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Biological Computing</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Data Mining</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">DNA Computing</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Evolutionary Programming</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Evolutionary Algorithms</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Image Understanding</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Intelligent Systems</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Knowledge Discovery</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Learning Algorithms</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Machine Learning</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Multi-Agent Systems</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Multi-Objective EA</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Neural Networks</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Particle Swarm Optimization</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Probabilistic Reasoning</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Reinforcement Learning</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Supervised Learning</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Swarm Intelligence</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l0 level2 lfo2;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Probabilistic Learning</span></p>
<p class="MsoNormal" style="margin-left:69.0pt;text-indent:-21.0pt;mso-list:l1 level1 lfo1;
tab-stops:list 69.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">l<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Information Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Access Control</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Authentication and Authorization</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Block/Stream Ciphers</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Cryptography and Coding</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Cryptographic Protocols</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Cryptanalysis</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Computer Forensics</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Hash Functions</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Information and System Integrity</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Intrusion Detection</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Information Hiding</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Internet/Intranet Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Information Security Management</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Key/Identity Management</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Mobile Communications Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Malicious Codes</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Mobile Code & Agent Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Network & Wireless Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Public Key Cryptosystems</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Public Key Infrastructure</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Secret Sharing</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Security Management</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Steganography & Watermarking</span></p>
<p class="MsoNormal" style="margin-left:69.0pt;text-indent:-21.0pt;mso-list:l1 level1 lfo1;
tab-stops:list 69.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">l<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Applications</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Anti-Virus</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Biometrics</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Content Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Cryptography and Applications</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Communication Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Copyright Protection</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Database Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Digital Signatures</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Data Privacy</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Distributed Systems Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Detection of Abnormality</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Elliptic Curve Cryptosystems</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Financial Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Electronic Commerce Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Information Discovery</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Mobile Device Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Multimedia Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Software Encryption</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">System Security</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Statistical Data Analysis</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Web Privacy and Trust</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Web Authentication</span></p>
<p class="MsoNormal" style="margin-left:90.0pt;text-indent:-21.0pt;mso-list:l1 level2 lfo1;
tab-stops:list 90.0pt"><span lang="EN-US" style="font-family:
Wingdings;mso-fareast-font-family:Wingdings;mso-bidi-font-family:Wingdings"><span style="mso-list:Ignore">n<span style="font:7.0pt "Times New Roman""> </span></span></span><span lang="EN-US">Web Security and Integrity</span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US">For more details, please visit the
conference web site at: <a href="http://www.cis-lab.org/">http://www.cis-lab.org/</a></span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US">Thank you very much for your great support.</span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US">Best regards,</span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>
<p class="MsoNormal"><span lang="EN-US">CIS2011 Secretariat</span></p>
<p class="MsoNormal"><span lang="EN-US">(E-mail: <a href="mailto:cis_conf@xidian.edu.cn">cis_conf@xidian.edu.cn</a>, <a href="mailto:cis.lab.conf@gmail.com">cis.lab.conf@gmail.com</a> )</span></p>
<p class="MsoNormal"><span lang="EN-US"> </span></p>