posted by user: akirakanaoka || 4765 views || tracked by 2 users: [display]

AsiaJCIS 2018 : The 13th Asia Joint Conference on Information Security


When Aug 8, 2018 - Aug 9, 2018
Where Guilin, China
Submission Deadline Apr 20, 2018
Notification Due Jun 10, 2018
Final Version Due Jun 22, 2018
Categories    security   privacy   cryptography

Call For Papers

Call for Papers

The 13th Asia Joint Conference on Information Security (AsiaJCIS 2018)
August 8- 9, 2018

The 13th Asia Joint Conference on Information Security (AsiaJCIS 2018) will be held in Guilin, China on August 8 through 9, 2018. The focus of this conference is on the technical and practical aspects of the security applications. The conference will serve as a forum to present new results from the academic research community as well as from the industry. Original papers are solicited for submission to AsiaJCIS. In addition, several distinguished security experts will be invited to give technical talks.

Areas of interest include, but not limited to:
- Cryptography
-- Applied cryptography
-- Post-Quantum cryptography
-- Cryptanalysis
-- Lightweight cryptography
- Network security
-- Cloud security
-- NGN security
-- Home network security
-- Mobile, ad-hoc and sensor network security
-- VANET security
-- Network RFID security
-- Wireless PAN/LAN/MAN/WAN security
-- P2P network security
-- DoS/DDoS attack countermeasures
-- Leakage resilience
- System security
-- System/Middleware/OS security
-- Virtualization security
-- Database security
-- Secure eHealth/eBusiness/eCommerce/eGovernment
-- Secure eVote/eContract/eCash
-- Blockchain
-- Ubiquitous security
-- Internet of Things (IoT)
-- Forward secure system
- Application security
-- Anti-spam
-- Web Services security
-- SNS security
-- VoIP security
-- Smartphone security
-- IPTV security
- Information security management
-- Human resource security
-- IT assurance
-- Security policy
-- Digital evidence
-- Big data
- Others
-- Cloud computing system
-- Smart grid security
-- Malware countermeasures
-- Content security
-- ID management and privacy controls
-- Biometrics
-- Security engineering
-- Usable security and privacy
-- Outsourcing/Verifiable computing

Instructions for Authors
Authors are invited to submit original papers. The papers must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Authors of accepted papers must give oral presentation at the conference. Papers of authors who will not attend the conference will be deleted from the conference proceedings, and will be announced as "no show paper" on the conference site.

The paper submission should conform to the following guidelines:
The submission must be written in English and at most 8 pages in length including references and appendices in the IEEE Xplore format for conference. Extra payment is changed for more pages in full paper case. Formatted to US Letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text).

Please download the IEEE Template in Word version or Latex version. Authors should submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. Submissions ignoring these guidelines may be rejected without further consideration.

Important Dates
Paper Submission deadline: May 4, 2018 (Extended)
Acceptance notification: June 10, 2018
Camera-ready due: June 22, 2018
Conference date: August 8-9, 2018
Submission webpage
The submission webpage is

For further information regarding to the conference, please send email to or contact the chairs directly.

General co-chairs
Tianlong Gu, Guilin University of Electronic Technology, China
Heung YoulYoum, Soonchunhyang University, Korea
Koji Nakao, KDDI / NICT, Japan
D. J. Guan, National Sun Yat-sen University, Taiwan

Honorary co-chairs
Dingyi Pei, Guangzhou University, China
Chin-Chen Chang, Feng Chia University, Taiwan
Hideki Imai, Chuo University, Japan

Steering committees
Chun-I Fan, National Sun Yat-sen University, Taiwan
Daisuke Inoue, NICT, Japan
Hee Kuck Oh, Hanvang University, Korea
Hiroaki Kikuchi, Meiji University, Japan
Seokwoo Kim, Hansei University, Korea
Chin-Laung Lei, National Taiwan University, Taiwan
Fenghua Li, Institute of Information Engineering, Chinese Academy of Sciences, China
Yutaka Miyake, KDDI R&D Laboratories, Japan
Gwangsoo Rhee, Sookmyung Women’s University, Korea
Shiuh-Jeng WANG, Central Police University, Taiwan
Hajime Watanabe, AIST, Japan
Yoo Jae Won, KISA, Korea
Bo Yang, Shaanxi Normal University, China
Hung-Min Sun, National Tsing Hua University, Taiwan

Advisory committees
Ji-hong Kim, Semyung University, Korea
Kouichi Sakurai, Kyusyu University, Japan
Tzong-Chen Wu, National Taiwan University of Science and Technology, Taiwan
Shiuhpyng Shieh, National Chiao Tung University, Taiwan
Qianhong Wu, Beihang University, China
Fangguo Zhang, Sun Yat-sen University, China
Jaehoon Nah, ETRI, Korea

Organizing committee chair
Liang Chang, Guilin University of Electronic Technology, China

Organizing committees
Yongzhuang Wei, Guilin University of Electronic Technology, China
Yanbin Zheng, Guilin University of Electronic Technology, China
Yujue Wang, Guilin University of Electronic Technology, China

Program co-chairs
Yong Ding, Guilin University of Electronic Technology, China
Jungsuk Song, KISTI, Korea
Akira Kanaoka, Toho University, Japan
Raylin Tso, National Chengchi University, Taiwan

Publication chairs
Ryoichi Isawa, NICT, Japan
Huy Kang, Kim, Korea University, Korea
Chih-Hung Wang, National Chiayi University, Taiwan
Yujue Wang, Guilin University of Electronic Technology, China

Technical programme committees
Hyoungshick Kim, Sungkyunkwan University, Korea
Anirban Basu, University of Sussex, UK
Chia-Mei Chen, National Sun Yat-sen University, Taiwan
I-Te Chen, Kaohsiung Medical University, Taiwan
Keundug Park, Korea Security Evaluation Laboratory Co., Ltd. (KSEL), Korea
Kefei Chen, Shanghai Jiaotong University, China
Tzung-Her Chen, National Chiayi University, Taiwan
Chen-Mou Cheng, National Taiwan University, Taiwan
Jiin-Chiou Cheng, Southern Taiwan University of Science and Technology, Taiwan
Hung-Yu Chien, National Chi Nan University, Taiwan
Wei-Hua He, Soochow University, Taiwan
Yoshiaki Hori, Saga University, Japan
Chien-Lung Hsu, Chang Gung University, Taiwan
Chun-Ying Huang, National Taiwan Ocean University, Taiwan
Qiong Huang, South China Agricultural University, China
Xinyi Huang, Fujian Normal University, China
Min-Shiang Hwang, Asia University, Taiwan
Ren-Junn Hwang, Tamkang University, Taiwan
Makoto Iwamura, NTT, Japan
Wen-Shenq Juang, National Kaohsiung First University of Science and Technology, Taiwan
Yongzhong Huang, Guilin University of Electronic Technology, China
Ayumu Kubota, KDDI Research, Japan
Wen-Chung Kuo, National Yunlin University of Science and Technology, Taiwan
Hiroki Kuzuno, SECOM, Japan
Taekyung Kim, Myong Ji College, Korea
Wei-Shen Lai, Chienkuo Technology University, Taiwan
Chin-Feng Lee, Chaoyang University of Technology, Taiwan
Wenfen Liu, Guilin University of Electronic Technology, China
Jung-San Lee, Feng Chia University, Taiwan
Narn-Yih Lee, Southern Taiwan University of Science and Technology, Taiwan
Nai-Wei Lo, National Taiwan University of Science and Technology, Taiwan
Fagen Li, UESTC, China
Chu-Hsing Lin, Tunghai University, Taiwan
Shengli Liu, Shanghai Jiaotong University, China
Daisuke Miyamoto, NAIST, Japan
Satsuya Ohata, AIST, Japan
Katsunari Yoshioka, Yokohama National University, Japan
Junji Nakazato, NICT, Japan
Dae Hun Nyang, Inda University, Korea
Kazumasa Omote, University of Tsukuba, Japan
Shaoning Pang, Unitec, New Zealand
Neung Soo Park, Konkuk University, Korea
Purui Su, Institute of Software Chinese Academy of Sciences, China
Yizhi Ren, Hangzhou Dianzi University, China
Kyung-Hyune Rhee, Pukyong University, Korea
Seonghan Shin, AIST, Japan
Heeseok Kim, Korea University, Korea
Chunming Tang, Guangzhou University, China
Shaohua Tang, South China University of Technology, China
Yuh-Min Tseng, National Changhua University of Education, Taiwan
Chih-Hung Wang, National Chiayi University, Taiwan
Wei Wang, Beijing Jiaotong University, China
Weili Han, Fudan University, China
Qianhong Wu, Beihang University, China
Peng Xu, Huazhong University of Science and Technology, China
Yongjin Yeom, Kookmin University, Korea
Ming-Hour Yang, Chung Yuan Christian University, Taiwan
Wu-Chuan Yang, I-Shou University, Taiwan
He Yongzhong, Beijing Jiaotong University, China
Boyeon Song, KISTI, Korea
Xiangyong Zeng, Hubei University, China
Fangguo Zhang, Sun-Yatsen University, China
Mingwu Zhang, Hubei University of Technology, China
Zhenfeng Zhang, Chinese Academy of Sciences, China

Hosted by
School of Computer Science and Information Security, Guilin University of Electronic Technology, China

Sponsored by
Guilin University of Electronic Technology, China

Supported by
Technical Committee on Information and Communication System Security (ICSS), Information and Systems Society (ISS), IEICE, Japan
Korea Institute for Information Security and Cryptology (KIISC), Korea
Chinese Cryptology and Information Security Association (CCISA), Taiwan

Related Resources

IJCAI 2020   International Joint Conference on Artificial Intelligence
SP 2020   IEEE Symposium on Security and Privacy
ISD 2020   29th International Conference on Information Systems Development
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ICSFrontiers 2020   2020 2nd International Conference on Frontiers of Information and Communications Security (ICSFrontiers 2020)
EI/SCOPUS-APMIE 2020   2020 Asia-Pacific Conference on Mechanical and Industrial Engineering (APMIE 2020)
IFIP SEC 2020   35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference
CISDM 2020   2020 2nd European Conference on Information System and Data Mining (CISDM 2020)