posted by user: saraforesti || 11384 views || tracked by 16 users: [display]

ISC 2011 : 14th Information Security Conference


Conference Series : Information Security Conference
When Oct 26, 2011 - Oct 29, 2011
Where Xi’an, China
Submission Deadline May 22, 2011
Notification Due Jul 20, 2011
Final Version Due Aug 10, 2011
Categories    information security

Call For Papers

[Apologies if you receive multiple copies of this message]

Deadline extended to May 22, 2011


14th Information Security Conference (ISC 2011)
Xi'an, China -- 26-29 October, 2011

The 14th Information Security Conference (ISC 2011) will be held in
Xi'an, China. It will be sponsored by China Computer Federation
(CCF) and co-organized by Xidian University. The conference website
is The Information Security
Conference (ISC) is an annual international conference covering
research in theory and applications of Information Security.
ISC aims to attract high quality papers in all technical aspects
of information security.

The conference seeks submissions from academia, industry, and
government that present novel research on all theoretical and
practical aspects of Information Security. Topics of interest
include, but are not limited to:

- access control
- accountability
- anonymity and pseudonymity
- applied cryptography
- authentication
- biometrics
- computer forensics
- cryptographic protocols
- database security
- data protection
- data/system integrity
- digital right management
- economics of security and privacy
- electronic frauds
- formal methods in security
- identity management
- information dissemination control
- information hiding and watermarking
- intrusion detection
- network security
- peer-to-peer security
- privacy
- secure group communications
- security and privacy in pervasive/ubiquitous computing
- security in information flow
- security in IT outsourcing
- security for mobile code
- secure cloud computing
- security of eCommerce, eBusiness and eGovernment
- security in location services
- security modeling and architectures
- security models for ambient intelligence environments
- security in social networks
- trust models and trust management policies
- embedded security

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions are limited to 16 pages
in the llncs style, including bibliography and any appendices; each
submission must be intelligible and self-contained within this length.
All submissions should be appropriately anonymized (i.e., should not
contain author names or affiliations, or obvious citations).

Submissions must be made at the web page:
Only pdf submissions will be accepted. Submissions not meeting these
guidelines risk rejection without review. At least one author of each
accepted paper is required to register with the conference and
present the paper. Accepted papers will be published by Springer in
the Lecture Notes in Computer Science series.

There will be a best paper award and a best student paper award. Any
paper co-authored by a full-time student is eligible for both the
best student paper award and the best paper award. Authors of selected
papers will be invited to submit extended versions of their ISC'11
papers to a Special Issue of the ISI-ranked International Journal
of Information Security (IJIS).

Paper submission deadline: May 22, 2011
Notification of acceptance: July 20, 2011
Proceedings version deadline: August 10, 2011

Pizheng Li

Hui Li
Xidian University, China

Xuejia Lai
Shanghai Jiaotong University, China

Jianying Zhou
I2R, Singapore

Michel Abdalla, ENS, France
Joonsang Baek, I2R, Singapore
Feng Bao, I2R, Singapore
Alex Biryukov, University of Luxembourg, Luxembourg
Mike Burmester, Florida State University, USA
Levente Buttyan, Budapest Univ. of Technology and Economics, Hungary
Ee-Chien Chang, NUS, Singapore
Liqun Chen, HP Laboratories, Bristol,UK
Xiaofeng Chen, Xidian University, China
Chen-Mou Cheng, National Taiwan University, Taiwan
Sherman Chow, University of Waterloo, Canada
Vanesa Daza, Universitat Pompeu Fabra, Spain
Roberto Di Pietro, University of Roma Tre, Italy
Claudia Diaz, Katholieke Universiteit Leuven, Belgium
Xuhua Ding, SMU, Singapore
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Eduardo Fernandez, Florida Atlantic University,Florida, USA
Josep Lluis Ferrer-Gomila, University of the Balearic Islands, Spain
Sara Foresti, Universita' degli Studi di Milano, Italy
Guang Gong, University of Waterloo, Canada
Stefanos Gritzalis, University of the Aegean, Greece
Dawu Gu, Shanghai Jiaotong University, China
Guofei Gu, Texas A&M University, USA
Sokratis Katsikas, University of Piraeus, Greece
Angelos Keromytis, Columbia University, USA
Yingjiu Li, SMU, Singapore
Zhenkai Liang, NUS, Singapore
Peng Liu, Penn State University, USA
Javier Lopez, University of Malaga, Spain
Emmanouil Magkos, University of the Ionian, Greece
Masahiro Mambo, University of Tsukuba, Japan
Mark Manulis, TU Darmstadt, Germany
Chris Mitchell, RHUL, UK
Atsuko Miyaji, JAIST, Japan
Yi Mu, UoW, Australia
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Raphael Phan, Loughborough University, UK
Vincent Rijmen, Katholieke Universiteit Leuven, Belgium
Matt Robshaw, Orange Labs, France
Kouichi Sakurai, Kyushu University, Japan
Gokay Saldamli, Bogazici University, Turkey
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Miguel Soriano, UPC, Spain
Rainer Steinwandt, CCIS, USA
Willy Susilo, UoW, Australia
Tsuyoshi Takagi, Kyushu University, Japan
Ivan Visconti, University of Salerno, Italy
Haining Wang, College of William and Mary, USA
Lingyu Wang, Concordia University, Canada
Jian Weng, Jinan University, China
Duncan Wong, City University of Hong Kong, China
Shouhuai Xu, UT San Antonio, USA
Jeff Yan, Newcastle University, UK
Yanjiang Yang, I2R, Singapore
Sencun Zhu, Penn State University, USA

Masahiro Mambo
University of Tsukuba, Japan

Ed Dawson, Queensland University of Technology, Australia
Hui Li, Xidian University, China
Javier Lopez, University of Malaga, Spain
Spyros Magliveras, CCIS, Florida Atlantic University, USA
Eiji Okamoto, University of Tsukuba, Japan
Susan Wetzel, Stevens Institute of Technology, USA
Yuliang Zheng, University of North Carolina at Charlotte, USA

Sara Foresti, Universita' degli Studi di Milano, Italy
Xiaofeng Chen, Xidian University, China

Pei Qingqi, Xidian University, China
Zuo Yuanyuan, Xidian University, China
Zhu Xiaoyan, Xidian University, China
Shi Yun, CCF TCCOMM, China

Phone: +86-29-88204749

Related Resources

ICCDA--Ei 2023   2023 The 7th International Conference on Computing and Data Analysis (ICCDA 2023)
CSE 2022   10th International Conference on Computational Science and Engineering
ISC HPC 2023   ISC High Performance 2023
ICISSP 2023   9th International Conference on Information Systems Security and Privacy
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
IJESA 2022   International Journal of Embedded Systems and Applications
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
IJCIS 2022   International Journal on Cryptography and Information Security
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
ACIE--EI 2023   2023 The 3rd Asia Conference on Information Engineering (ACIE 2023)