posted by user: saraforesti || 10017 views || tracked by 17 users: [display]

ISC 2011 : 14th Information Security Conference


Conference Series : Information Security Conference
When Oct 26, 2011 - Oct 29, 2011
Where Xi’an, China
Submission Deadline May 22, 2011
Notification Due Jul 20, 2011
Final Version Due Aug 10, 2011
Categories    information security

Call For Papers

[Apologies if you receive multiple copies of this message]

Deadline extended to May 22, 2011


14th Information Security Conference (ISC 2011)
Xi'an, China -- 26-29 October, 2011

The 14th Information Security Conference (ISC 2011) will be held in
Xi'an, China. It will be sponsored by China Computer Federation
(CCF) and co-organized by Xidian University. The conference website
is The Information Security
Conference (ISC) is an annual international conference covering
research in theory and applications of Information Security.
ISC aims to attract high quality papers in all technical aspects
of information security.

The conference seeks submissions from academia, industry, and
government that present novel research on all theoretical and
practical aspects of Information Security. Topics of interest
include, but are not limited to:

- access control
- accountability
- anonymity and pseudonymity
- applied cryptography
- authentication
- biometrics
- computer forensics
- cryptographic protocols
- database security
- data protection
- data/system integrity
- digital right management
- economics of security and privacy
- electronic frauds
- formal methods in security
- identity management
- information dissemination control
- information hiding and watermarking
- intrusion detection
- network security
- peer-to-peer security
- privacy
- secure group communications
- security and privacy in pervasive/ubiquitous computing
- security in information flow
- security in IT outsourcing
- security for mobile code
- secure cloud computing
- security of eCommerce, eBusiness and eGovernment
- security in location services
- security modeling and architectures
- security models for ambient intelligence environments
- security in social networks
- trust models and trust management policies
- embedded security

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions are limited to 16 pages
in the llncs style, including bibliography and any appendices; each
submission must be intelligible and self-contained within this length.
All submissions should be appropriately anonymized (i.e., should not
contain author names or affiliations, or obvious citations).

Submissions must be made at the web page:
Only pdf submissions will be accepted. Submissions not meeting these
guidelines risk rejection without review. At least one author of each
accepted paper is required to register with the conference and
present the paper. Accepted papers will be published by Springer in
the Lecture Notes in Computer Science series.

There will be a best paper award and a best student paper award. Any
paper co-authored by a full-time student is eligible for both the
best student paper award and the best paper award. Authors of selected
papers will be invited to submit extended versions of their ISC'11
papers to a Special Issue of the ISI-ranked International Journal
of Information Security (IJIS).

Paper submission deadline: May 22, 2011
Notification of acceptance: July 20, 2011
Proceedings version deadline: August 10, 2011

Pizheng Li

Hui Li
Xidian University, China

Xuejia Lai
Shanghai Jiaotong University, China

Jianying Zhou
I2R, Singapore

Michel Abdalla, ENS, France
Joonsang Baek, I2R, Singapore
Feng Bao, I2R, Singapore
Alex Biryukov, University of Luxembourg, Luxembourg
Mike Burmester, Florida State University, USA
Levente Buttyan, Budapest Univ. of Technology and Economics, Hungary
Ee-Chien Chang, NUS, Singapore
Liqun Chen, HP Laboratories, Bristol,UK
Xiaofeng Chen, Xidian University, China
Chen-Mou Cheng, National Taiwan University, Taiwan
Sherman Chow, University of Waterloo, Canada
Vanesa Daza, Universitat Pompeu Fabra, Spain
Roberto Di Pietro, University of Roma Tre, Italy
Claudia Diaz, Katholieke Universiteit Leuven, Belgium
Xuhua Ding, SMU, Singapore
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Eduardo Fernandez, Florida Atlantic University,Florida, USA
Josep Lluis Ferrer-Gomila, University of the Balearic Islands, Spain
Sara Foresti, Universita' degli Studi di Milano, Italy
Guang Gong, University of Waterloo, Canada
Stefanos Gritzalis, University of the Aegean, Greece
Dawu Gu, Shanghai Jiaotong University, China
Guofei Gu, Texas A&M University, USA
Sokratis Katsikas, University of Piraeus, Greece
Angelos Keromytis, Columbia University, USA
Yingjiu Li, SMU, Singapore
Zhenkai Liang, NUS, Singapore
Peng Liu, Penn State University, USA
Javier Lopez, University of Malaga, Spain
Emmanouil Magkos, University of the Ionian, Greece
Masahiro Mambo, University of Tsukuba, Japan
Mark Manulis, TU Darmstadt, Germany
Chris Mitchell, RHUL, UK
Atsuko Miyaji, JAIST, Japan
Yi Mu, UoW, Australia
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Raphael Phan, Loughborough University, UK
Vincent Rijmen, Katholieke Universiteit Leuven, Belgium
Matt Robshaw, Orange Labs, France
Kouichi Sakurai, Kyushu University, Japan
Gokay Saldamli, Bogazici University, Turkey
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Miguel Soriano, UPC, Spain
Rainer Steinwandt, CCIS, USA
Willy Susilo, UoW, Australia
Tsuyoshi Takagi, Kyushu University, Japan
Ivan Visconti, University of Salerno, Italy
Haining Wang, College of William and Mary, USA
Lingyu Wang, Concordia University, Canada
Jian Weng, Jinan University, China
Duncan Wong, City University of Hong Kong, China
Shouhuai Xu, UT San Antonio, USA
Jeff Yan, Newcastle University, UK
Yanjiang Yang, I2R, Singapore
Sencun Zhu, Penn State University, USA

Masahiro Mambo
University of Tsukuba, Japan

Ed Dawson, Queensland University of Technology, Australia
Hui Li, Xidian University, China
Javier Lopez, University of Malaga, Spain
Spyros Magliveras, CCIS, Florida Atlantic University, USA
Eiji Okamoto, University of Tsukuba, Japan
Susan Wetzel, Stevens Institute of Technology, USA
Yuliang Zheng, University of North Carolina at Charlotte, USA

Sara Foresti, Universita' degli Studi di Milano, Italy
Xiaofeng Chen, Xidian University, China

Pei Qingqi, Xidian University, China
Zuo Yuanyuan, Xidian University, China
Zhu Xiaoyan, Xidian University, China
Shi Yun, CCF TCCOMM, China

Phone: +86-29-88204749

Related Resources

ICSRS--Scopus & EI 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
CRITIS 2021   The 16th International Conference on Critical Information Infrastructures Security
CyberHunt 2020   IEEE International Workshop on Big Data Analytics for Cyber Threat Hunting
Elec-SI-IIDS 2021   Special Issue on Design of Intelligent Intrusion Detection Systems
CCNET 2020   7th International Conference on Computer Networks & Communications
ICENT--EI Compendex, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
ICISSP 2021   7th International Conference on Information Systems Security and Privacy
ISC HPC 2020   ISC High Performance 2020
ICIM--Scopus, Ei 2021   2021 the IEEE 7th International Conference on Information Management (ICIM 2021)--Scopus, Ei Compendex