posted by user: znarcher || 13646 views || tracked by 48 users: [display]

ASIACCS 2011 : The 6th ACM Symposium on Information, Computer and Communications Security


Conference Series : ACM Symposium on Information, Computer and Communications Security
When Mar 22, 2011 - Mar 24, 2011
Where Hong Kong
Submission Deadline Oct 8, 2010
Notification Due Dec 3, 2010
Final Version Due Dec 20, 2010
Categories    security   network security   information security

Call For Papers

The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)

22 - 24 March 2011
Admiralty Learning Centre, Hong Kong, China

Web Page:

Call for Papers

To build on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then the ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009) and Beijing (2010). ASIACCS 2011 is the sixth conference of the series.

ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security.

Areas of interest for ASIACCS 2011 include, but are not limited to:
- anonymity
- inference/controlled disclosure
- cryptographic protocols
- access control
- intellectual-property protection
- data/system integrity
- secure networking
- digital-rights management
- information warfare
- accounting and audit
- trusted computing
- formal methods for security
- key management
- phishing and countermeasures
- identity management
- intrusion detection
- commercial and industry security
- security in ubiquitous computing, e.g., RFIDs
- authentication
- security management
- smartcards
- web security
- security and privacy for emerging technologies, e.g., VoIP, peer-to-peer and overlay network systems, Web 2.0
- data and application security
- applied cryptography
- malware and botnets
- mobile-computing security
- privacy-enhancing technology
- software security

Instructions for Authors
Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered), excluding the bibliography and well-marked appendices and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. All submissions must be anonymized (an author's name should only occur in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others). Only PDF or Postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.

All papers should be submitted through the website:

Papers must be written in English. We require that the authors use the ACM format for papers, using one of the ACM SIG Proceeding Templates (

Accepted papers will be published by ACM Press in conference proceedings and in the ACM Digital Library, which is indexed by EI. Final proceedings versions will be 10 pages in double-column ACM format; although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some short papers could also be accepted and included in the proceedings.

Important Dates
Submission Deadline (extended): 8 October 2010, 23:59 UTC
Acceptance Notification: 3 December 2010
Camera-ready Copy Due: 20 December 2010
Conference: 22 - 24 March 2011

Best Paper Award
The Program Committee is planning to give Best Paper Awards to the best conference paper. (Details to be announced.)

Organized By: Department of Computer Science, The University of Hong Kong, China
Supported By:
- Center for Information Security and Cryptography (CISC), HKU, China
- School of Professional and Continuing Education (SPACE), HKU, China
- Department of Computer Science, City University of Hong Kong, China
Honorary Chair: Way Kuo (President of City University of Hong Kong, China)
General Co-Chairs: Bruce Cheung (The University of Hong Kong, China), Lucas Hui (The University of Hong Kong, China)
Program Co-Chairs: Ravi Sandhu (University of Texas, San Antonio), Duncan S. Wong (City University of Hong Kong, China)
Local Organizing Chair: S. M. Yiu (The University of Hong Kong, China)

Steering Committee
Shiuhpyng Shieh (Chair) (NCTU, Taiwan)
Elisa Bertino (Purdue University, USA)
Mike Reiter (University of North Carolina at Chapel Hill, USA)
Ninghui Li (Purdue University, USA)
Eiji Okamoto (University of Tsukuba, Japan)
Li Gong (Mozilla Online Ltd., USA)
Vijay Varadharajan (Macquarie University, Australia)
David Basin (ETH, Switzerland)
Robert Deng (SMU, Singapore)
Virgil Gligor (CMU, USA)
Hideki Imai (AIST, Japan)
Sushil Jajodia (GMU, USA)
Pierangela Samarati (University of Milan, Italy)

Program Committee
Vijay Atluri (Rutgers Univ., USA)
Michael Backes (Saarland Univ. and MPI-SWS, Germany)
Joonsang Baek (I2R, Singapore)
David Basin (ETH Zurich, Switzerland)
Colin Boyd (QUT, Australia)
David Brumley (Carnegie Mellon Univ., USA)
Mike Burmester (Florida State Univ., USA)
Zhenfu Cao (Shanghai Jiao Tong Univ., China)
Srdjan Capkun (ETH Zurich, Switzerland)
Kefei Chen (Shanghai Jiao Tong Univ., China)
Liqun Chen (HP Labs, UK)
Tzi-cker Chiueh (Stony Brook Univ., USA)
Marc Dacier (Symantec Research Labs Europe)
Robert Deng (SMU, Singapore)
Feng Bao (I2R, Singapore)
Dengguo Feng (Chinese Academy of Sciences, China)
Eiichiro Fujisaki (NTT Labs, Japan)
Jun Furukawa (NEC, Japan)
David Galindo (Univ. of Luxembourg, Luxembourg)
Virgil Gligor (Carnegie Mellon Univ., USA)
Guofei Gu (Texas A&M Univ., USA)
Qijun Gu (Texas State Univ., USA)
Apu Kapadia (Indiana Univ., USA)
Kwangjo Kim (KAIST, Korea)
Adam J. Lee (Univ. of Pittsburgh, USA)
Yingjiu Li (SMU, Singapore)
Dongdai Lin (Chinese Academy of Sciences, China)
Peng Liu (Pennsylvania State Univ., USA)
Mark Manulis (TU Darmstadt, Germany)
Sjouke Mauw (Univ. of Luxembourg, Luxembourg)
Catherine Meadows (Naval Research Laboratory, USA)
Chris Mitchell (Royal Holloway, Univ. of London, UK)
Yi Mu (Univ. of Wollongong, Australia)
David Naccache (ENS, France)
Eiji Okamoto (Univ. of Tsukuba, Japan)
Panagiotis Papadimitratos (EPFL Lausanne, Switzerland)
Josef Pieprzyk (Macquarie Univ., Australia)
Alexander Pretschner (Karlsruhe Institute of Technology, Germany)
Kui Ren (Illinois Institute of Technology, USA)
Michael Rusinowitch (LORIA-INRIA-Lorraine, France)
Rei Safavi-Naini (Univ. of Calgary, Canada)
Pierangela Samarati (Univ. of Milan, Italy)
Shiuhpyng Shieh (Chiao Tung Univ., Chinese Taipei)
Sean W. Smith (Dartmouth College, USA)
Anna Squicciarini (Pennsylvania State Univ., USA)
Willy Susilo (Univ. of Wollongong, Australia)
Tsuyoshi Takagi (Kyushu Univ., Japan)
Bhavani Thuraisingham (Univ. of Texas, Dallas, USA)
Dongyan Xu (Purdue Univ., USA)
Damien Vergnaud (ENS, France)
Xun Yi (Victoria Univ., Australia)
Fangguo Zhang (Sun Yat-sen Univ., China)
Jianying Zhou (I2R, Singapore)

Related Resources

OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
IJCSITY 2017   International Journal of Computational Science and Information Technology
ACMC 2017   Australasian Computer Music Conference
ICSS 2017   3rd International Conference on Software Security
ICGSP--ACM, Scopus, Ei 2018   ACM--2018 The 2nd International Conference on Graphics and Signal Processing (ICGSP 2018)--Scopus, Ei Compendex
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
AITIJ 2017   Advances in Interconnect Technologies: An International Journal
ECCV 2018   European Conference on Computer Vision