posted by user: saraforesti || 6399 views || tracked by 17 users: [display]

ISC 2011 : 14th Information Security Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security Conference
 
Link: http://ste.xidian.edu.cn/isc2011/
 
When Oct 26, 2011 - Oct 29, 2011
Where Xi’an, China
Submission Deadline May 22, 2011
Notification Due Jul 20, 2011
Final Version Due Aug 10, 2011
Categories    information security
 

Call For Papers

[Apologies if you receive multiple copies of this message]

Deadline extended to May 22, 2011

CALL FOR PAPERS

**********************************************************************
14th Information Security Conference (ISC 2011)
Xi'an, China -- 26-29 October, 2011
http://ste.xidian.edu.cn/isc2011/
**********************************************************************

The 14th Information Security Conference (ISC 2011) will be held in
Xi'an, China. It will be sponsored by China Computer Federation
(CCF) and co-organized by Xidian University. The conference website
is http://ste.xidian.edu.cn/isc2011/. The Information Security
Conference (ISC) is an annual international conference covering
research in theory and applications of Information Security.
ISC aims to attract high quality papers in all technical aspects
of information security.

The conference seeks submissions from academia, industry, and
government that present novel research on all theoretical and
practical aspects of Information Security. Topics of interest
include, but are not limited to:

- access control
- accountability
- anonymity and pseudonymity
- applied cryptography
- authentication
- biometrics
- computer forensics
- cryptographic protocols
- database security
- data protection
- data/system integrity
- digital right management
- economics of security and privacy
- electronic frauds
- formal methods in security
- identity management
- information dissemination control
- information hiding and watermarking
- intrusion detection
- network security
- peer-to-peer security
- privacy
- secure group communications
- security and privacy in pervasive/ubiquitous computing
- security in information flow
- security in IT outsourcing
- security for mobile code
- secure cloud computing
- security of eCommerce, eBusiness and eGovernment
- security in location services
- security modeling and architectures
- security models for ambient intelligence environments
- security in social networks
- trust models and trust management policies
- embedded security


INSTRUCTIONS FOR AUTHORS
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions are limited to 16 pages
in the llncs style, including bibliography and any appendices; each
submission must be intelligible and self-contained within this length.
All submissions should be appropriately anonymized (i.e., should not
contain author names or affiliations, or obvious citations).

Submissions must be made at the web page:
http://www.easychair.org/conferences/?conf=isc2011.
Only pdf submissions will be accepted. Submissions not meeting these
guidelines risk rejection without review. At least one author of each
accepted paper is required to register with the conference and
present the paper. Accepted papers will be published by Springer in
the Lecture Notes in Computer Science series.

There will be a best paper award and a best student paper award. Any
paper co-authored by a full-time student is eligible for both the
best student paper award and the best paper award. Authors of selected
papers will be invited to submit extended versions of their ISC'11
papers to a Special Issue of the ISI-ranked International Journal
of Information Security (IJIS).


IMPORTANT DATES
Paper submission deadline: May 22, 2011
Notification of acceptance: July 20, 2011
Proceedings version deadline: August 10, 2011


GENERAL CO-CHAIRS
Pizheng Li
CCF TCCOMM, China

Hui Li
Xidian University, China


PROGRAM CO-CHAIRS
Xuejia Lai
Shanghai Jiaotong University, China

Jianying Zhou
I2R, Singapore


PROGRAM COMMITTEE
Michel Abdalla, ENS, France
Joonsang Baek, I2R, Singapore
Feng Bao, I2R, Singapore
Alex Biryukov, University of Luxembourg, Luxembourg
Mike Burmester, Florida State University, USA
Levente Buttyan, Budapest Univ. of Technology and Economics, Hungary
Ee-Chien Chang, NUS, Singapore
Liqun Chen, HP Laboratories, Bristol,UK
Xiaofeng Chen, Xidian University, China
Chen-Mou Cheng, National Taiwan University, Taiwan
Sherman Chow, University of Waterloo, Canada
Vanesa Daza, Universitat Pompeu Fabra, Spain
Roberto Di Pietro, University of Roma Tre, Italy
Claudia Diaz, Katholieke Universiteit Leuven, Belgium
Xuhua Ding, SMU, Singapore
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Eduardo Fernandez, Florida Atlantic University,Florida, USA
Josep Lluis Ferrer-Gomila, University of the Balearic Islands, Spain
Sara Foresti, Universita' degli Studi di Milano, Italy
Guang Gong, University of Waterloo, Canada
Stefanos Gritzalis, University of the Aegean, Greece
Dawu Gu, Shanghai Jiaotong University, China
Guofei Gu, Texas A&M University, USA
Sokratis Katsikas, University of Piraeus, Greece
Angelos Keromytis, Columbia University, USA
Yingjiu Li, SMU, Singapore
Zhenkai Liang, NUS, Singapore
Peng Liu, Penn State University, USA
Javier Lopez, University of Malaga, Spain
Emmanouil Magkos, University of the Ionian, Greece
Masahiro Mambo, University of Tsukuba, Japan
Mark Manulis, TU Darmstadt, Germany
Chris Mitchell, RHUL, UK
Atsuko Miyaji, JAIST, Japan
Yi Mu, UoW, Australia
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Raphael Phan, Loughborough University, UK
Vincent Rijmen, Katholieke Universiteit Leuven, Belgium
Matt Robshaw, Orange Labs, France
Kouichi Sakurai, Kyushu University, Japan
Gokay Saldamli, Bogazici University, Turkey
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Miguel Soriano, UPC, Spain
Rainer Steinwandt, CCIS, USA
Willy Susilo, UoW, Australia
Tsuyoshi Takagi, Kyushu University, Japan
Ivan Visconti, University of Salerno, Italy
Haining Wang, College of William and Mary, USA
Lingyu Wang, Concordia University, Canada
Jian Weng, Jinan University, China
Duncan Wong, City University of Hong Kong, China
Shouhuai Xu, UT San Antonio, USA
Jeff Yan, Newcastle University, UK
Yanjiang Yang, I2R, Singapore
Sencun Zhu, Penn State University, USA


STEERING COMMITTEE CHAIR
Masahiro Mambo
University of Tsukuba, Japan


STEERING COMMITTEE MEMBERS
Ed Dawson, Queensland University of Technology, Australia
Hui Li, Xidian University, China
Javier Lopez, University of Malaga, Spain
Spyros Magliveras, CCIS, Florida Atlantic University, USA
Eiji Okamoto, University of Tsukuba, Japan
Susan Wetzel, Stevens Institute of Technology, USA
Yuliang Zheng, University of North Carolina at Charlotte, USA


PUBLICITY CO-CHAIRS
Sara Foresti, Universita' degli Studi di Milano, Italy
Xiaofeng Chen, Xidian University, China


ORGANIZING COMMITTEE
Pei Qingqi, Xidian University, China
Zuo Yuanyuan, Xidian University, China
Zhu Xiaoyan, Xidian University, China
Shi Yun, CCF TCCOMM, China


CONTACT
Email: xyzhu@xidian.edu.cn; lihui@mail.xidian.edu.cn
Phone: +86-29-88204749

Related Resources

OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
eCrime 2018   13th Symposium on Electronic Crime Research
ICSS 2017   3rd International Conference on Software Security
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
AITIJ 2017   Advances in Interconnect Technologies: An International Journal
ISC HPC 2017   ISC High Performance 2017
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
ISC HPC 2018   ISC High Performance 2018