posted by system || 6525 views || tracked by 5 users: [display]

CCS 2014 : 9th ACM Symposium on Information, Computer and Communications Security

FacebookTwitterLinkedInGoogle

Link: http://asiaccs2014.nict.go.jp/
 
When Jun 4, 2014 - Jun 6, 2014
Where Kyoto, Japan
Submission Deadline Dec 16, 2013
Categories    security
 

Call For Papers

Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then ASIACCS has been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), Seoul (2012), and Hangzhou (2013).

 ASIACCS 2014 is the ninth conference of the series, and will be held in Kyoto, Japan, a city renowned for its historic relics and natural beauty. Kyoto was (and some say still is a) capital of Japan for over a millennium, and contains many sites of cultural significance, including some of the most famous temples and shrines in Japan as well as imperial palaces and gardens. In addition, Kyoto is home to Nintendo among many other computer companies.

 ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2014 include, but are not limited to:

- Access control
- Accounting and audit
- Anonymity
- Applied cryptography
- Authentication
- Cloud computing security
- Data and application security
- Digital forensics
- Embedded systems security
- Formal methods for security
- Hardware-based security
- Inference control and disclosure
- Intrusion detection
- Key management
- Malware and botnets
- Mobile computing security
- Network security
- Operating system security
- Privacy-enhancing technology
- Security architectures
- Security metrics
- Software security
- Trusted computing
- Usable security and privacy
- Web security
- Wireless security

Related Resources

Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCCIS 2026   2026 6th International Conference on Computer Communication and Information Systems (CCCIS 2026)
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
Ei/Scopus-CEICE 2026   2026 3rd International Conference on Electrical, Information and Communication Engineering (CEICE 2026)
DPPR 2025   15th International Conference on Digital Image Processing and Pattern Recognition
ICIVP 2026   2026 2nd International Conference on Image and Video Processing (ICIVP 2026)
DNLP 2026   7th International Conference on Data Mining and NLP
ITCC 2026   2026 8th International Conference on Information Technology and Computer Communications (ITCC 2026)
ICICSP--EI 2026   2026 9th International Conference on Information Communication and Signal Processing (ICICSP 2026)