posted by system || 2228 views || tracked by 3 users: [display]

CCS Asia 2008 : Asia CCS'08 ACM Symposium on Information, Computer and Communications Security

FacebookTwitterLinkedInGoogle

Link: http://www.rcis.aist.go.jp/asiaccs08/
 
When Mar 19, 2008 - Mar 20, 2008
Where Tokyo, Japan
Submission Deadline Oct 1, 2007
Notification Due Nov 20, 2007
Categories    security
 

Call For Papers

*** DEADLINE EXTENDED to October 1st.***


Call for Papers

2008 ACM Symposium on
Information, Computer and Communications Security
(ASIACCS'08)

March 18-20, 2008, Akihabara, Tokyo, Japan
http://www.rcis.aist.go.jp/asiaccs08/


IMPORTANT DATES
----------------

Submission Deadline: October 1, 2007 (15:00 UTC)
Author Notification: November 20, 2007
Camera-Ready Copy Due: December 1, 2007


SCOPE
----------------

To build on the success of ACM Conference on Computer and
Communications Security (CCS) and ACM Transactions on Information and
System Security (TISSEC), the ACM Special Interest Group on Security,
Audit, and Control (SIGSAC) formally established the annual ACM
Symposium on InformAtion, Computer and Communications Security
(ASIACCS), whose first edition held in 2006. ASIACCS 2008 is the third
conference of the series. The conference is hosted by National
Institute of Advanced Industrial Science and Technology (AIST), and
sponsored by ACM SIGSAC and AIST. Topics of interest include, but are
not limited to:

- Network Security
- Public-key Cryptography
- Symmetric-key Cryptography
- Cryptographic Protocols
- Hash Functions
- Anonymity and Privacy
- RFID Security
- Security Policy
- Access Control
- Formal Method
- Intrusion Detection
- Security Analysis
- Software Security
- Hardware Security
- Mobile Security
- Fundamentals
- Digital Rights Management
- Information Hiding
- Quantum Cryptography
- Implementations


HOW TO SUBMIT
----------------

Submissions take place entirely via a web system:

https://www.rcis.aist.go.jp/asiaccs08/submission/


INSTRUCTION FOR AUTHORS
----------------

Submissions must not substantially duplicate work that has been
published in, or submitted in parallel to, any journal, other
conference or workshop that has proceedings.

The paper must be
* anonymous *
with no author names, affiliations, acknowledgements, or obvious
references. It should begin with a title, a short abstract, and a
list of keywords. The paper should be at most
* 12 pages *
excluding the bibliography and clearly marked appendices using
reasonable font size and margins and at most 20 pages in total.
(Although no specific format is required for submission, please
keep in mind that the final paper will have to fit in 12 pages
in the standard ACM two-column format.) The main body of the paper
should be intelligible and self-contained as the committee members
are not required to read the appendices.


PROGRAM COMMITTEE
-----------------

Michel Abdalla ENS, France
Masayuki Abe NTT, Japan (Co-Chair)
N. Asokan Nokia Research Center, Finland
Giuseppe Ateniese The Johns Hopkins Univ., USA
Michael Backes University of Saarland, Germany
Feng Bao I2R, Singapore
David Basin ETH Zurich, Switzerland
Lujo Bauer CMU, USA
Steven Bellovin Columbia University, USA
Carlo Blundo Universita degli Studi di Salerno, Italy
Emmanuel Bresson DCSSI Crypto Lab, France
Liqun Chen HP Labs, UK
Jason Crampton Royal Holloway Univ. of London, UK
Robert Deng Singapore Management Univ., Singapore
Yvo Desmedt University College London, UK
Giovanni Di Crescenzo Telcordia Technologies, USA
Marc Fischlin Darmstadt Univ. of Tech., Germany
Virgil Gligor University of Maryland, USA (Co-Chair)
Philippe Golle PARC, USA
Amir Herzberg Bar-Ilan University, Israel
Tetsu Iwata Nagoya University, Japan
Richard Kemmerer UC Santa Barbara, USA
Aggelos Kiayias University of Connecticut, USA
Yongdae Kim Umiversity of Minnesota, USA
Michiharu Kudo IBM Japan, Japan
Wenke Lee Georgia Tech, USA
Patrick McDaniel Pennsylvania State University, USA
John McLean Naval Research Laboratory, USA
Catherine Meadows Naval Research Lab., USA
Jonathan Millen Mitre Corporation, USA
Shiho Moriai Sony, Japan
Yi Mu Wollongong University, Australia
Jorn Muller-Quade Universitat Karlsruhe, Germany
Chanathip Namprempre Thammasat University, Thailand
Peng Ning North Carolina State University, USA
Cristina Nita-Rotaru Purdue, USA
Satoshi Obana NEC, Japan
Miyako Ohkubo IPA, Japan
Tatsuaki Okamoto NTT, Japan
Panos Papadimitratos EPFL Lausanne, Switzerland
Raphael Phan EPFL, Switzerland
Jean-Jacques Quisquater UCL, Belgium
Pandu Rangan Indian Institute of Tech., India
Michael Reiter University of North Carolina at Chapel Hill, USA
Reihaneh Safavi-Naini University of Calgary, Canada
Tomas Sander HP Laboratories, USA
Ravi Sandhu University of Texas San Antonio & TriCipher, USA
Shiuhpyng Shieh National Chiao Tung University, Taiwan
Sean Smith Dartmouth University, USA
Rene Struik Certicom, Canada
Wen-Guey Tzeng National Chio Tung University, Taiwan
Cliff Wang North Carolina State University, USA
Huaxiong Wang Nanyang Tech. University, Singapore
Huafei Zhu I2R, Singapore


Organizing Committee
-----------------
Hajime Watanabe AIST, Japan (General Chair)
Goichiro Hanaoka AIST, Japan
Rui Zhang AIST, Japan

Related Resources

FCSIT 2021   2021 3rd Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2021)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ADIP--EI Compendex, Scopus 2021   2021 3rd Asia Digital Image Processing Conference (ADIP 2021)--EI Compendex, Scopus
IJCIS 2021   International Journal on Cryptography and Information Security
ADIP--EI, Scopus 2021   2021 3rd Asia Digital Image Processing Conference (ADIP 2021)--EI Compendex, Scopus
IJCCSA 2021   International Journal on Cloud Computing: Services and Architecture
APSys 2021   12th ACM SIGOPS Asia-Pacific Workshop on Systems
BES 2021   5th International Conference on Biomedical Engineering and Science
CCS 2021   ACM CCS 2021 : ACM Conference on Computer and Communications Security (1st Cycle)
CCS 2021   CCS 2021 : ACM CCS 2021 : ACM Conference on Computer and Communications Security (2nd Cycle)