| |||||||||||||||
ICICS(网络安全C 6月) 2018 : The 20th International Conference on Information and Communications SecurityConference Series : International Conference on Information and Communication Security | |||||||||||||||
Link: http://conference.imt-lille-douai.fr/icics2018/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
================================================================
CALL FOR PAPERS ICICS 2018 20th International Conference on Information and Communications Security Lille, France, October 29-31, 2018 http://conference.imt-lille-douai.fr/icics2018/ Conference Overview ================ The 2018 International Conference on Information and Communications Security will be the 20th event in the ICICS conference series. The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security. ICICS 2018 will be organized by IMT Lille Douai of Institut Mines-Télécom, the largest engineering graduate school in northern France. Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2018. Topics of interest include, but are not limited to: - Access control - Anonymity - Applied cryptography - Authentication and authorization - Biometrics security - Blockchain and digital currency security - Cloud security - Computer and digital forensics - Cyber-Physical Systems security - Data and system integrity - Database security - Distributed systems security - E-Commerce security and trust issues - Embedded systems security - Engineering issues of cryptographic protocols and security systems - Fraud and cyber-crime - Hardware security - Identity access management - Industrial Control Systems security - Information hiding and watermarking - Insider threat detection - Intellectual property protection - Intrusion detection - IoT security and privacy - Key management and key recovery - Language-based security - Malware and Anti-malware - Mobile computing security and privacy - Network security - Network Functions Virtualization security - Operating systems security - Post-snowden cryptography - Privacy protection - Privacy-preserving data mining - Risk assessment - Social networks security, privacy and trust - Software Defined Networking security - Security management - Security models, metrics, and policies - Security and privacy of Big Data - Security of Critical Infrastructures - Trust and reputation systems - Trusted computing and trustworthy computing technologies - Usable security and privacy - Underground economy - Verification of security protocols - Web security - Wireless security Instruction for Authors ================ Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Submissions should be in English, as a PDF file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions. The manuscripts should be submitted via EasyChair system https://easychair.org/conferences/?conf=icics2018 Paper accepted by the Program Committee will be presented at ICICS 2018 and included in the conference's proceeding published by Springer in its Lecture Notes in Computer Science series. Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings. Important Dates ================ - Paper submission deadline: June 22, 2018 (extended) - Notification of acceptance: July 27, 2018 (extended) - Camera-ready due: August 6, 2018 (extended) - Conference: October 29-31, 2018 Confirmed Keynote Speaker ================ Speaker #1: Adrian Perrig, Department of Computer Science at ETH Zürich, Switzerland Title: Next-Generation Public-Key Infrastructures Speaker #2: Eric Freyssinet, Chief digital strategy officer, National Gendarmerie (gendarmerie nationale), France Title: TBD Journal Special Issue ================ Selected papers from the conference will be invited to a special issue of the journal Computers & Security (Elsevier). Organizing Committee ================ Honorary General Chair - Alain-Louis Schmitt, IMT Lille Douai, Institut Mines-Télécom, France General Chair - Zonghua Zhang, IMT Lille Douai, Institut Mines-Télécom, France General Co-Chair - Ahmed Meddahi, IMT Lille Douai, Institut Mines-Télécom, France PC Chairs - David Naccache, École Normale Supérieure, France - Shouhuai Xu, University of Texas at San Antonio, USA PC Co-Chairs - Sihan Qing, Chinese Academy of Science and Peking University, China - Pierangela Samarati, Universitàdegli Studi di Milano, Italy Publication Chairs - Gregory Blanc, Télécom SudParis, Institut Mines-Télécom, France - Rongxing Lu, University of New Brunswick, Canada Publicity Chairs - Houda Labiod, Télécom ParisTech, Institut Mines-Télécom, France - Shujun Li, University of Kent, UK Industry Liaison Chair - Martine Ducornet, IMT Lille Douai, Institut Mines-Télécom, France Technical Program Committee ================ - Gregory Blanc, Télécom SudParis, Institut Mines-Télécom, France - Joonsang Baek, University of Wollongong, Australia - Gouenou Coatrieux, IMT Atlantique, Institut Mines-Télécom, France - Frédéric Cuppens, IMT Atlantique, Institut Mines-Télécom, France - Nora Cuppens-Boulahia, IMT Atlantique, Institut Mines-Télécom, France - Zhenfu Cao, East China Normal University, China - Haixin Duan, Tsinghua University, China - Jean-Luc Danger, Télécom ParisTech, Institut Mines-Télécom, France - Antony Fleury, IMT Lille Douai, Institut Mines-Télécom, France - Doudou Fall, NAIST, Japan - Angelo Genovese, Università degli Studi di Milano, Italy - Debin Gao, Singapore Management University, Singapore - Dieter Gollmann, Hamburg University of Technology, Germany - Joaquin Garcia-Alfaro, Télécom SudParis, Institut Mines-Télécom, France - Hongxin Hu, Clemson University, USA - Shouling Ji, Zhejiang University, China - Nizar Kheir, Thales, France - Sokratis K. Katsikas, Norwegian University of Science & Technology (NTNU), Norway - Houda Labiod, Télécom ParisTech, Institut Mines-Télécom, France - Maryline Laurent, Télécom SudParis, Institut Mines-Télécom, France - Shujun Li, University of Kent, UK - Yang Liu, Nanyang Technological University, Singapore - Giovanni Livrava, Università degli Studi di Milano, Italy - Rongxing Lu, University of New Brunswick, Canada - Xiaodong Lin, Wilfrid Laurier University, Canada - Atsuko Miyaji, Osaka University/JAST, Japan - Aziz Mohaisen, University of Central Florida, USA - Jean-Yves Marion, LORIA, France - Zhe Liu, NUAA, China and Univ. of Luxembourg - David Naccache, École normale supérieure, France - Takashi Nishide, University of Tsukuba, Japan - Sihan Qing, Chinese Academy of Sciences and Peking University, China - Cauchie Stéphane, equensWorldline, France - Chunhua Su, University of Aizu, Japan - Mario Südholt, IMT Atlantique, France - Pierangela Samarati, Università degli Studi di Milano, Italy - Sandra Scott-Hayward, Queen’s University Belfast, UK - Seungwon Shin, KAIST, Korea - Zhiyong Shan, Wichita State University, USA - Juan Tapiador, Universidad Carlos III de Madrid, Spain - Qiang Tang, LIST, Luxembourg - Wei Wang, Beijing Jiaotong University, China - Lei Xu, University of Houston, USA - Shouhuai Xu, University of Texas at San Antonio, USA - Guanyuan Yan, Binghamton University, State University of New York, USA - Min Yang, Fudan University, China - Fengwei Zhang, Wayne State University, USA - Haojin Zhu, Shanghai Jiaotong University, China - Yongbin Zhou, IIE, Chinese Academy of Sciences, China Contact Organizers ================ Email: icics2018@imt-lille-douai.fr |
|