ICICS: International Conference on Information and Communication Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2015 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ICICS 2014 The 16th International Conference on Information and Communications Security
Dec 16, 2014 - Dec 17, 2014 Hong Kong Aug 15, 2014
ICICS 2013 15th International Conference on Information and Communications Security
Nov 20, 2013 - Nov 22, 2013 Beijing, China Jun 5, 2013
ICICS 2012 International Conference on Information and Communications Security
Oct 29, 2012 - Oct 31, 2012 Hong Kong May 25, 2012
ICICS 2010 Twelfth International Conference on Information and Communications Security
Dec 15, 2010 - Dec 17, 2010 Barcelona Jul 22, 2010
 
 

Present CFP : 2014

ICICS 2014
The Sixteenth International Conference on Information and Communications Security
Hong Kong, December 16 - 17, 2014.

Call for Papers
---------------

Conference Overview:
The 2014 International Conference on Information and Communications Security will be the 16th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.
ICICS 2014 will be co-organized by the Center for Information Security and Cryptography (CISC), Department of Computer Science, The University of Hong Kong and Institute of Software, Chinese Academy of Sciences (ISCAS), China, sponsored by Information Security and Forensics Society (ISFS), Hong Kong.
Original papers on all aspects of information and communications security are solicited for submission to ICICS2014. Areas of interest include, but are not limited to:

-Access control
-Anonymity
-Anti-virus and anti-worms
-Applied cryptography
-Authentication and authorization
-Biometric security
-Cloud security
-Computer and digital forensics
-Cyber-physical systems security
-Data and system integrity
-Database security
-Digital currency
-Distributed systems security
-Electronic commerce security
-Engineering issues of cryptographic and security systems
-Fraud and cyber-crime
-Hardware security
-Information hiding and watermarking
-Intellectual property protection
-Intrusion detection
-Key management and key recovery
-Language-based security
-Network security
-Operating systems security
-Privacy protection
-Risk evaluation and security
-Security for mobile computing
-Security in wearable computing and Internet of things
-Security models
-Security protocols
-Trusted computing and trustworthy computing technology
-Usable security

Instructions for Authors:
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
Submissions should be in English, as a PDF or PS file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 12 A4-sized pages including the bibliography, but excluding well-marked appendices. Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.
At least one author of each accepted paper should register the conference and give presentation at the conference.

Important Dates:
Paper submission deadline: August 15, 2014
Notification of acceptance: September 15, 2014
Camera-ready due: September 31, 2014
Conference: December 16-17, 2014

Additional Information:
Conference homepage: http://www.cs.hku.hk/icics2014/
Email: icics@cs.hku.hk

Among the preceding conferences, ICICS1997 took place in Beijing, China, ICICS1999 in Sydney, Australia, ICICS2001 in Xian, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, ICICS2006 in Raleigh, NC, USA, ICICS2007 in Zhengzhou, China, and ICICS2008 in Birmingham, UK, ICICS2009 in Beijing, China, ICICS2010 in Barcelona, Spain, ICICS2011 in Beijing, China, ICICS2012 in Hong Kong and ICICS2013 in Beijing, China. The proceedings were released as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4381, 5308, 5927, 6476, 7043, 7618, and 8233 of the LNCS series of Springer, respectively.
 

Related Resources

SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IJISS 2016   International Journal of Information Security Science (IJISS)
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
PAM 2017   Passive and Active Measurement Conference
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
ICFCC 2017   2017 9th International Conference on Future Computer and Communication (ICFCC 2017) - Ei & Scopus
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing