posted by user: znarcher || 23886 views || tracked by 47 users: [display]

ASIACCS 2011 : The 6th ACM Symposium on Information, Computer and Communications Security

FacebookTwitterLinkedInGoogle


Conference Series : ACM Symposium on Information, Computer and Communications Security
 
Link: http://www.cs.hku.hk/asiaccs2011/
 
When Mar 22, 2011 - Mar 24, 2011
Where Hong Kong
Submission Deadline Oct 8, 2010
Notification Due Dec 3, 2010
Final Version Due Dec 20, 2010
Categories    security   network security   information security
 

Call For Papers

The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)

22 - 24 March 2011
Admiralty Learning Centre, Hong Kong, China

Web Page: http://www.cs.hku.hk/asiaccs2011/
Contact: asiaccs2011@cs.hku.hk


Call for Papers
===============

Overview
--------
To build on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then the ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009) and Beijing (2010). ASIACCS 2011 is the sixth conference of the series.

ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security.


Topics
------
Areas of interest for ASIACCS 2011 include, but are not limited to:
- anonymity
- inference/controlled disclosure
- cryptographic protocols
- access control
- intellectual-property protection
- data/system integrity
- secure networking
- digital-rights management
- information warfare
- accounting and audit
- trusted computing
- formal methods for security
- key management
- phishing and countermeasures
- identity management
- intrusion detection
- commercial and industry security
- security in ubiquitous computing, e.g., RFIDs
- authentication
- security management
- smartcards
- web security
- security and privacy for emerging technologies, e.g., VoIP, peer-to-peer and overlay network systems, Web 2.0
- data and application security
- applied cryptography
- malware and botnets
- mobile-computing security
- privacy-enhancing technology
- software security


Instructions for Authors
------------------------
Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered), excluding the bibliography and well-marked appendices and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. All submissions must be anonymized (an author's name should only occur in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others). Only PDF or Postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.

All papers should be submitted through the website: http://www.easychair.org/conferences/?conf=asiaccs2011

Papers must be written in English. We require that the authors use the ACM format for papers, using one of the ACM SIG Proceeding Templates (http://www.acm.org/sigs/pubs/proceed/template.html).

Accepted papers will be published by ACM Press in conference proceedings and in the ACM Digital Library, which is indexed by EI. Final proceedings versions will be 10 pages in double-column ACM format; although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some short papers could also be accepted and included in the proceedings.


Important Dates
---------------
Submission Deadline (extended): 8 October 2010, 23:59 UTC
Acceptance Notification: 3 December 2010
Camera-ready Copy Due: 20 December 2010
Conference: 22 - 24 March 2011


Best Paper Award
----------------
The Program Committee is planning to give Best Paper Awards to the best conference paper. (Details to be announced.)


Organizers
----------
Organized By: Department of Computer Science, The University of Hong Kong, China
Supported By:
- Center for Information Security and Cryptography (CISC), HKU, China
- School of Professional and Continuing Education (SPACE), HKU, China
- Department of Computer Science, City University of Hong Kong, China
Honorary Chair: Way Kuo (President of City University of Hong Kong, China)
General Co-Chairs: Bruce Cheung (The University of Hong Kong, China), Lucas Hui (The University of Hong Kong, China)
Program Co-Chairs: Ravi Sandhu (University of Texas, San Antonio), Duncan S. Wong (City University of Hong Kong, China)
Local Organizing Chair: S. M. Yiu (The University of Hong Kong, China)


Steering Committee
------------------
Shiuhpyng Shieh (Chair) (NCTU, Taiwan)
Elisa Bertino (Purdue University, USA)
Mike Reiter (University of North Carolina at Chapel Hill, USA)
Ninghui Li (Purdue University, USA)
Eiji Okamoto (University of Tsukuba, Japan)
Li Gong (Mozilla Online Ltd., USA)
Vijay Varadharajan (Macquarie University, Australia)
David Basin (ETH, Switzerland)
Robert Deng (SMU, Singapore)
Virgil Gligor (CMU, USA)
Hideki Imai (AIST, Japan)
Sushil Jajodia (GMU, USA)
Pierangela Samarati (University of Milan, Italy)


Program Committee
-----------------
Vijay Atluri (Rutgers Univ., USA)
Michael Backes (Saarland Univ. and MPI-SWS, Germany)
Joonsang Baek (I2R, Singapore)
David Basin (ETH Zurich, Switzerland)
Colin Boyd (QUT, Australia)
David Brumley (Carnegie Mellon Univ., USA)
Mike Burmester (Florida State Univ., USA)
Zhenfu Cao (Shanghai Jiao Tong Univ., China)
Srdjan Capkun (ETH Zurich, Switzerland)
Kefei Chen (Shanghai Jiao Tong Univ., China)
Liqun Chen (HP Labs, UK)
Tzi-cker Chiueh (Stony Brook Univ., USA)
Marc Dacier (Symantec Research Labs Europe)
Robert Deng (SMU, Singapore)
Feng Bao (I2R, Singapore)
Dengguo Feng (Chinese Academy of Sciences, China)
Eiichiro Fujisaki (NTT Labs, Japan)
Jun Furukawa (NEC, Japan)
David Galindo (Univ. of Luxembourg, Luxembourg)
Virgil Gligor (Carnegie Mellon Univ., USA)
Guofei Gu (Texas A&M Univ., USA)
Qijun Gu (Texas State Univ., USA)
Apu Kapadia (Indiana Univ., USA)
Kwangjo Kim (KAIST, Korea)
Adam J. Lee (Univ. of Pittsburgh, USA)
Yingjiu Li (SMU, Singapore)
Dongdai Lin (Chinese Academy of Sciences, China)
Peng Liu (Pennsylvania State Univ., USA)
Mark Manulis (TU Darmstadt, Germany)
Sjouke Mauw (Univ. of Luxembourg, Luxembourg)
Catherine Meadows (Naval Research Laboratory, USA)
Chris Mitchell (Royal Holloway, Univ. of London, UK)
Yi Mu (Univ. of Wollongong, Australia)
David Naccache (ENS, France)
Eiji Okamoto (Univ. of Tsukuba, Japan)
Panagiotis Papadimitratos (EPFL Lausanne, Switzerland)
Josef Pieprzyk (Macquarie Univ., Australia)
Alexander Pretschner (Karlsruhe Institute of Technology, Germany)
Kui Ren (Illinois Institute of Technology, USA)
Michael Rusinowitch (LORIA-INRIA-Lorraine, France)
Rei Safavi-Naini (Univ. of Calgary, Canada)
Pierangela Samarati (Univ. of Milan, Italy)
Shiuhpyng Shieh (Chiao Tung Univ., Chinese Taipei)
Sean W. Smith (Dartmouth College, USA)
Anna Squicciarini (Pennsylvania State Univ., USA)
Willy Susilo (Univ. of Wollongong, Australia)
Tsuyoshi Takagi (Kyushu Univ., Japan)
Bhavani Thuraisingham (Univ. of Texas, Dallas, USA)
Dongyan Xu (Purdue Univ., USA)
Damien Vergnaud (ENS, France)
Xun Yi (Victoria Univ., Australia)
Fangguo Zhang (Sun Yat-sen Univ., China)
Jianying Zhou (I2R, Singapore)

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
SECRYPT 2025   22nd International Conference on Security and Cryptography