| |||||||||||||||
ISPEC 2016 : The 12th International Conference on Information Security Practice and ExperienceConference Series : Information Security Practice and Experience | |||||||||||||||
Link: http://trust.csu.edu.cn/conference/ispec2016/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
------------------------------------------------------------------------------------------
Part I: Call for Papers, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016 ------------------------------------------------------------------------------------------ The 12th International Conference on Information Security Practice and Experience (ISPEC 2016) Organizers: Central South University, China Guangzhou University, China Jishou University, China Technical Co-Sponsorship: HUAWEI Company, China Springer Lecture Notes in Computer Science (LNCS) Venue & Dates: Zhangjiajie, China, November 16-18, 2016 http://trust.csu.edu.cn/conference/ISPEC2016/ ------------------------------------------------------------------------------------------ Introduction ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. The previous ISPEC conference series were successfully held in Singapore, Hangzhou, Hong Kong, Sydney, Xi'an, Seoul, Guangzhou, Hangzhou, Lanzhou, Fuzhou and Beijing. The twelfth ISPEC will be held in Zhangjiajie, China, November 16-18, 2016. ISPEC 2016 will be hosted by Central South University, China. Scope and Interests Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to: - Access control - Applied cryptography - Availability, resilience, and usability - Big data and Cloud security - Cryptanalysis - Embedded system security - Database security - Digital Forensics - Digital rights management - Information security in vertical applications - Intrusion detection - Multimedia security - Network security - Privacy and anonymity - Risk evaluation and security certification - Security for cyber-physical systems - Security of smart cards and RFID systems - Security policy - Security protocols - Security systems - Smart Grid Security - Smartphone Security - Trust model and management - Trusted computing Submission and Publication Information All papers need to be submitted electronically through the conference website (https://easychair.org/conferences/?conf=ispec2016) with PDF format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 14 pages or 20 pages with the over length charge in Springer LNCS format, including tables, figures, references and appendixes. Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. ISPEC 2016 reserves the right to exclude a paper from distribution after the conference (e.g., removal from the digital library and index service), if the paper is not presented at the conference. All accepted papers will be published by Springer LNCS (EI Indexed). One outstanding paper will be selected to receive the Best Paper Award. Important Dates (1) Workshop Proposal Deadline: March 1, 2016 (2) Paper Submission Deadline: July 1, 2016 (3) Author Notification: August 15,2016 (4) Camera-ready Papers Due: September 15, 2016 (5) Conference Dates: November 16-18, 2016 General Chairs Guojun Wang, Central South University, China |
|