| |||||||||||||||
AsiaJCIS 2018 : The 13th Asia Joint Conference on Information Security | |||||||||||||||
Link: http://gcis.guet.edu.cn/asiajcis2018 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
The 13th Asia Joint Conference on Information Security (AsiaJCIS 2018) August 8- 9, 2018 The 13th Asia Joint Conference on Information Security (AsiaJCIS 2018) will be held in Guilin, China on August 8 through 9, 2018. The focus of this conference is on the technical and practical aspects of the security applications. The conference will serve as a forum to present new results from the academic research community as well as from the industry. Original papers are solicited for submission to AsiaJCIS. In addition, several distinguished security experts will be invited to give technical talks. Topics Areas of interest include, but not limited to: - Cryptography -- Applied cryptography -- Post-Quantum cryptography -- Cryptanalysis -- Lightweight cryptography - Network security -- Cloud security -- NGN security -- Home network security -- Mobile, ad-hoc and sensor network security -- VANET security -- Network RFID security -- Wireless PAN/LAN/MAN/WAN security -- P2P network security -- FW/IDS/IPS -- DoS/DDoS attack countermeasures -- Leakage resilience - System security -- System/Middleware/OS security -- Virtualization security -- Database security -- Secure eHealth/eBusiness/eCommerce/eGovernment -- Secure eVote/eContract/eCash -- Blockchain -- Ubiquitous security -- Internet of Things (IoT) -- Forward secure system - Application security -- Anti-spam -- Web Services security -- SNS security -- VoIP security -- Smartphone security -- IPTV security - Information security management -- Human resource security -- IT assurance -- Security policy -- Digital evidence -- Big data - Others -- Cloud computing system -- Smart grid security -- Malware countermeasures -- Content security -- ID management and privacy controls -- Biometrics -- Security engineering -- Usable security and privacy -- Outsourcing/Verifiable computing Instructions for Authors Authors are invited to submit original papers. The papers must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Authors of accepted papers must give oral presentation at the conference. Papers of authors who will not attend the conference will be deleted from the conference proceedings, and will be announced as "no show paper" on the conference site. The paper submission should conform to the following guidelines: The submission must be written in English and at most 8 pages in length including references and appendices in the IEEE Xplore format for conference. Extra payment is changed for more pages in full paper case. Formatted to US Letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). Please download the IEEE Template in Word version or Latex version. Authors should submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. Submissions ignoring these guidelines may be rejected without further consideration. Important Dates Paper Submission deadline: May 4, 2018 (Extended) Acceptance notification: June 10, 2018 Camera-ready due: June 22, 2018 Conference date: August 8-9, 2018 Submission webpage The submission webpage is https://easychair.org/conferences/?conf=asiajcis2018 Contact For further information regarding to the conference, please send email to asiajcis2018@163.com or contact the chairs directly. Committees General co-chairs Tianlong Gu, Guilin University of Electronic Technology, China Heung YoulYoum, Soonchunhyang University, Korea Koji Nakao, KDDI / NICT, Japan D. J. Guan, National Sun Yat-sen University, Taiwan Honorary co-chairs Dingyi Pei, Guangzhou University, China Chin-Chen Chang, Feng Chia University, Taiwan Hideki Imai, Chuo University, Japan Steering committees Chun-I Fan, National Sun Yat-sen University, Taiwan Daisuke Inoue, NICT, Japan Hee Kuck Oh, Hanvang University, Korea Hiroaki Kikuchi, Meiji University, Japan Seokwoo Kim, Hansei University, Korea Chin-Laung Lei, National Taiwan University, Taiwan Fenghua Li, Institute of Information Engineering, Chinese Academy of Sciences, China Yutaka Miyake, KDDI R&D Laboratories, Japan Gwangsoo Rhee, Sookmyung Women’s University, Korea Shiuh-Jeng WANG, Central Police University, Taiwan Hajime Watanabe, AIST, Japan Yoo Jae Won, KISA, Korea Bo Yang, Shaanxi Normal University, China Hung-Min Sun, National Tsing Hua University, Taiwan Advisory committees Ji-hong Kim, Semyung University, Korea Kouichi Sakurai, Kyusyu University, Japan Tzong-Chen Wu, National Taiwan University of Science and Technology, Taiwan Shiuhpyng Shieh, National Chiao Tung University, Taiwan Qianhong Wu, Beihang University, China Fangguo Zhang, Sun Yat-sen University, China Jaehoon Nah, ETRI, Korea Organizing committee chair Liang Chang, Guilin University of Electronic Technology, China Organizing committees Yongzhuang Wei, Guilin University of Electronic Technology, China Yanbin Zheng, Guilin University of Electronic Technology, China Yujue Wang, Guilin University of Electronic Technology, China Program co-chairs Yong Ding, Guilin University of Electronic Technology, China Jungsuk Song, KISTI, Korea Akira Kanaoka, Toho University, Japan Raylin Tso, National Chengchi University, Taiwan Publication chairs Ryoichi Isawa, NICT, Japan Huy Kang, Kim, Korea University, Korea Chih-Hung Wang, National Chiayi University, Taiwan Yujue Wang, Guilin University of Electronic Technology, China Technical programme committees Hyoungshick Kim, Sungkyunkwan University, Korea Anirban Basu, University of Sussex, UK Chia-Mei Chen, National Sun Yat-sen University, Taiwan I-Te Chen, Kaohsiung Medical University, Taiwan Keundug Park, Korea Security Evaluation Laboratory Co., Ltd. (KSEL), Korea Kefei Chen, Shanghai Jiaotong University, China Tzung-Her Chen, National Chiayi University, Taiwan Chen-Mou Cheng, National Taiwan University, Taiwan Jiin-Chiou Cheng, Southern Taiwan University of Science and Technology, Taiwan Hung-Yu Chien, National Chi Nan University, Taiwan Wei-Hua He, Soochow University, Taiwan Yoshiaki Hori, Saga University, Japan Chien-Lung Hsu, Chang Gung University, Taiwan Chun-Ying Huang, National Taiwan Ocean University, Taiwan Qiong Huang, South China Agricultural University, China Xinyi Huang, Fujian Normal University, China Min-Shiang Hwang, Asia University, Taiwan Ren-Junn Hwang, Tamkang University, Taiwan Makoto Iwamura, NTT, Japan Wen-Shenq Juang, National Kaohsiung First University of Science and Technology, Taiwan Yongzhong Huang, Guilin University of Electronic Technology, China Ayumu Kubota, KDDI Research, Japan Wen-Chung Kuo, National Yunlin University of Science and Technology, Taiwan Hiroki Kuzuno, SECOM, Japan Taekyung Kim, Myong Ji College, Korea Wei-Shen Lai, Chienkuo Technology University, Taiwan Chin-Feng Lee, Chaoyang University of Technology, Taiwan Wenfen Liu, Guilin University of Electronic Technology, China Jung-San Lee, Feng Chia University, Taiwan Narn-Yih Lee, Southern Taiwan University of Science and Technology, Taiwan Nai-Wei Lo, National Taiwan University of Science and Technology, Taiwan Fagen Li, UESTC, China Chu-Hsing Lin, Tunghai University, Taiwan Shengli Liu, Shanghai Jiaotong University, China Daisuke Miyamoto, NAIST, Japan Satsuya Ohata, AIST, Japan Katsunari Yoshioka, Yokohama National University, Japan Junji Nakazato, NICT, Japan Dae Hun Nyang, Inda University, Korea Kazumasa Omote, University of Tsukuba, Japan Shaoning Pang, Unitec, New Zealand Neung Soo Park, Konkuk University, Korea Purui Su, Institute of Software Chinese Academy of Sciences, China Yizhi Ren, Hangzhou Dianzi University, China Kyung-Hyune Rhee, Pukyong University, Korea Seonghan Shin, AIST, Japan Heeseok Kim, Korea University, Korea Chunming Tang, Guangzhou University, China Shaohua Tang, South China University of Technology, China Yuh-Min Tseng, National Changhua University of Education, Taiwan Chih-Hung Wang, National Chiayi University, Taiwan Wei Wang, Beijing Jiaotong University, China Weili Han, Fudan University, China Qianhong Wu, Beihang University, China Peng Xu, Huazhong University of Science and Technology, China Yongjin Yeom, Kookmin University, Korea Ming-Hour Yang, Chung Yuan Christian University, Taiwan Wu-Chuan Yang, I-Shou University, Taiwan He Yongzhong, Beijing Jiaotong University, China Boyeon Song, KISTI, Korea Xiangyong Zeng, Hubei University, China Fangguo Zhang, Sun-Yatsen University, China Mingwu Zhang, Hubei University of Technology, China Zhenfeng Zhang, Chinese Academy of Sciences, China Hosted by School of Computer Science and Information Security, Guilin University of Electronic Technology, China Sponsored by Guilin University of Electronic Technology, China Supported by Technical Committee on Information and Communication System Security (ICSS), Information and Systems Society (ISS), IEICE, Japan Korea Institute for Information Security and Cryptology (KIISC), Korea Chinese Cryptology and Information Security Association (CCISA), Taiwan |
|