CCS: Computer and Communications Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
CCS 2016 23rd ACM Conference on Computer and Communications Security
Oct 24, 2016 - Oct 28, 2016 Vienna, Austria TBD
CCS 2015 22nd ACM Conference on Computer and Communications Security
Oct 12, 2015 - Oct 16, 2015 Denver, Colorado, US May 15, 2015
CCS 2014 21st ACM Conference on Computer and Communications Security
Nov 3, 2014 - Nov 7, 2014 Scottsdale, Arizona, USA May 16, 2014
CCS 2013 ACM Conference on Computer and Communications Security
Nov 4, 2013 - Nov 8, 2013 Berlin, Germany May 8, 2013
CCS 2012 ACM Conference on Computer and Communications Security
Oct 16, 2012 - Oct 18, 2012 Raleigh, NC May 4, 2012
CCS 2011 ACM Conference on Computer and Communications Security
Oct 17, 2011 - Oct 21, 2011 Chicago, IL May 6, 2011
CCS 2010 17th ACM Conference on Computer and Communications Security
Oct 4, 2010 - Oct 8, 2010 Chicago, IL Apr 17, 2010
CCS 2009 16th ACM Conference on Computer and Communications Security
Nov 9, 2009 - Nov 13, 2009 Chicago, IL Apr 20, 2009
CCS 2008 15th ACM Conference on Computer and Communications Security 2008
Nov 3, 2008 - Nov 7, 2008 Alexandria, VA, USA Apr 14, 2008
CCS 2007 14th ACM Conference on Computer and Communications Security 2007
Oct 29, 2007 - Nov 2, 2007 Alexandria, VA, USA May 8, 2007
 
 

Present CFP : 2016

ACM CCS 2016 Call for Papers

23rd ACM Conference on Computer and Communication Security
October 24 - 28, 2016, Hofburg Palace, Vienna, Austria


Paper Submission Due: May 23, 2016 23:59 UTC-11
First round reviews sent to authors: July 5, 2016
Author comments due on: July 8, 2016 23:59 UTC-11
Acceptance Notification: July 22, 2016
Camera Ready Papers Due: August 16, 2016


The ACM CCS conference seeks submissions from academia, government,
and industry presenting novel research results in all practical and
theoretical aspects of computer and communications security. Papers
should be related to the construction, evaluation, application, or
operation of secure systems. Theoretical papers must make a convincing
argument for the relevance of the results to secure systems. All topic
areas related to computer and communications security are of interest
and in scope. Accepted papers will be published by ACM Press in the
conference proceedings.


Paper Submission Process
------------------------
Submissions must be made by the deadline of Monday, May 23, 2016 23:59 UTC-11.
The review process will be carried out in two phases and authors will
have an opportunity to comment on the first-phase reviews.

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal, conference
or workshop. Simultaneous submission of the same work is not allowed.
Note that submitted papers cannot be withdrawn from the process after
the first phase reviews are received by authors. Authors of accepted
papers must guarantee that their papers will be presented at the
conference.


Paper Format
------------
Submissions must be at most 12 pages in double-column ACM format
(http://www.acm.org/sigs/publications/ proceedings-templates) including
the bibliography and well-marked appendices. Submissions must be
anonymized and avoid obvious self-references. Only PDF files will be
accepted. Submissions not meeting these guidelines risk rejection without
consideration of their merits.


Conflicts of Interest
---------------------
The program co-chairs require cooperation from both authors and program
committee members to prevent submissions from being evaluated by reviewers
who have a conflict of interest. During the submission process, we will
ask authors to identify members of the program committee with whom they
have a conflict of interest. This includes anyone with close personal
or professional relationship to any of the authors, such as close family
members, people from the same department/group, and recent collaborators
(e.g. collaborated on a joint paper in the last two years). It also
includes anyone in a position of substantial influence on (or by) the a
uthors, such as advisor or advisee (at any time in the past), line-of-management
relationship, grant program manager, etc.

In rare cases, we will allow conflict-of-interest designation due to
personal or professional animosity. In such cases, we require that in
addition to marking the conflict during submission, the authors contact
the program co-chairs by email and explain the reason for this conflict.

Program committee members who have a conflict of interest with a paper,
including program co-chairs, will be excluded from evaluation and
discussion of the paper. In the case of a program co-chair, the other
co-chairs who do not have conflicts will be responsible for managing
that paper.
 

Related Resources

ACM CCS 2016   23rd ACM Conference on Computer and Communications Security
ACISP 2017   Australasian Conference on Information Security and Privacy
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
SPTM 2016   Fourth International Conference of Security, Privacy and Trust Management
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance
AEIJ 2016   Advanced Energy: An International Journal
PETS-Fourth-Issue 2017   17th Privacy Enhancing Technologies Symposium