posted by system || 12877 views || tracked by 29 users: [display]

AsiaCCS 2010 : 5th ACM Symposium on Information, Computer and Communications Security

FacebookTwitterLinkedInGoogle


Conference Series : ACM Symposium on Information, Computer and Communications Security
 
Link: http://www.dacas.cn/asiaccs10/index.html
 
When Apr 13, 2010 - Apr 13, 2010
Where Beijing, China
Submission Deadline Sep 28, 2009
Notification Due Dec 8, 2009
Final Version Due Jan 8, 2010
Categories    security
 

Call For Papers

5th ACM Symposium on Information, Computer and Communications Security
Beijing, China, April 13-16, 2010
http://www.dacas.cn/asiaccs2010/


PAPERS:
Technical papers describing original unpublished research are solicited. Submissions must not be concurrently under review by a conference, journal, or any other venue that has proceedings.

SUBMISSION INSTRUCTIONS
Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered), excluding the bibliography and well-marked appendices and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. All submissions must be anonymized (an author's name should only occur in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others). Only PDF or Postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.

All papers should be submitted through the website:
http://www.easychair.org/conferences/?conf=asiaccs2010

Accepted papers will be published by ACM Press in conference proceedings. Final proceedings versions will be 10 pages in double-column ACM format; although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some poster papers could also be accepted and included in the proceedings.
TOPICS of interest include:
* anonymity
* access control
* secure networking
* accounting and audit
* key management
* intrusion detection
* authentication
* smartcards
* data and application security
* Malware and botnets
* privacy-enhancing technology
* software security
* inference/controlled disclosure
* intellectual-property protection
* digital-rights management
* trusted computing
* phishing and countermeasures
* commercial and industry security
* security management
* web security
* applied cryptography
* mobile-computing security
* cryptographic protocols
* data/system integrity
* information warfare
* formal methods for security
* identity management
* security in ubiquitous computing, e.g., RFIDs
* security and privacy for emerging technologies, e.g., VoIP, peer-to-peer and overlay network systems, Web 2.0

Important Dates
Submission deadline: -------- September 28, 2009
Author Notification: ------------- December 8, 2009
Camera-ready deadline:---------- January 8, 2010

Related Resources

AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
ITE 2021   2nd International Conference on Integrating Technology in Education
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
IJCCSA 2020   International Journal on Cloud Computing: Services and Architecture
ITCC--Ei and Scopus 2021   ACM--2021 3nd International Conference on Information Technology and Computer Communications (ITCC 2021)--Ei Compendex, Scopus
GridCom 2020   12th International Conference on Grid Computing
ITCC--Ei Compendex and Scopus 2021   ACM--2021 3nd International Conference on Information Technology and Computer Communications (ITCC 2021)--Ei Compendex, Scopus
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
ASIP--Ei and Scopus 2021   ACM--2021 3rd Asia Symposium on Image Processing (ASIP 2021)--Ei Compendex, Scopus
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier