| |||||||||||||
ICICS 2019 : The 21st International Conference on Information and Communications SecurityConference Series : International Conference on Information and Communication Security | |||||||||||||
Link: http://www.icics.cn/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
The 2019 International Conference on Information and Communications Security will be the 21st event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas. It will be organized by Peking University and Institute of Information Engineering, Chinese Academy of Sciences.
The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security. More info about the previous conferences can be found at https://dblp1.uni-trier.de/db/conf/icics/index.html. Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2019. There will be a Best Paper Award and a Best Student Paper Award. Areas of interest include, but are not limited to: Access control Social networks security, privacy and trust Key management and key recovery Software defined networking security Anonymity Embedded systems security Language-based security Security management Applied cryptography Security models, metrics, and policies Malware and anti-malware Fraud and cyber-crime Authentication and authorization Security and privacy of Big Data Mobile computing security and privacy Hardware security Biometrics security Security of critical Infrastructures Network security Identity access management Blockchain security and privacy Trust and reputation systems Cloud computing and edge computing security Trusted and trustworthy computing technologies Operating systems security Usable security and privacy Computer and digital forensics Insider threat detection Cyber-physical systems security Underground economy Privacy protection Intellectual property protection Data and system integrity Verification of security protocols Privacy-preserving data mining Intrusion detection Database security Web security Risk assessment IoT security and privacy Distributed systems security Wireless security Instructions for Authors Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Submissions should be in English, as a PDF file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions. The manuscripts should be submitted via EasyChair system (https://easychair.org/conferences/?conf=icics19 ). Important Dates Paper submission deadline: 10 Sept 2019 (23:59 AOE) Notification of acceptance: October 21, 2019 Camera-ready due: November 11, 2019 Conference: December 15-17, 2019 Additional Information Conference homepage: http://icics.cn/ Email: icics@iie.ac.cn |
|