posted by user: zdxxwqx || 593 views || tracked by 3 users: [display]

ICICS 2023 : The 25th International Conference on Information and Communications Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information and Communication Security
 
Link: https://icics23.nankai.edu.cn
 
When Nov 18, 2023 - Nov 20, 2023
Where Nankai University,Tianjin, China
Submission Deadline Mar 30, 2023
Notification Due Jun 10, 2023
Categories    access control and authorizati   security   privacy   crypto
 

Call For Papers

ICICS 2023: The 25th International Conference on Information and Communications Security
Nankai University
Tianjin, China, Nov 18-20, 2023
Conference website https://icics23.nankai.edu.cn
Submission link https://easychair.org/conferences/?conf=icics2023

Submission deadline: March 30, 2023


------------------------------------
The 25th International Conference on Information and Communications Security (ICICS 2023) is the next event in a series of highly successful international conference on information and communications security since 1997. Previous editions of ICICS were held in China (1997,2001,2003,2005,2007,2009,2011-2015,2017,2019,2021); UK (2022); Denmark (2020); France (2018); Singapore (2002,2016); Spain (2004,2010); UK (2008); USA (2006); and Australia (1999).

Important Dates:
------------------------------------
The review process will consist of two rounds. The tentative schedule is as follows:
Full papers due: March 30
Bidding for Papers: March 31 - April 4
First round reviews due: April 30
Early reject notification: May 2
Second round reviews due: May 30
Discussion: May 31- June 7
Notification to authors: June 10

Submission Guidelines
Submissions must be made through EasyChair at:https://easychair.org/conferences/?conf=icics2023Papers must be received by the aforementioned dates 23:59 (AOE).Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews.

Accepted papers will be presented at ICICS 2023 and included in the conference's proceeding published by Springer in its Lecture Notes in Computer Science (LNCS) series. Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.

Submissions should be in English, as a PDF file with all fonts embedded, in the Springer LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 10pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.


List of Topics
Topics of Interest
------------------------------------
Topics of interest include, but are not limited to:

* Access control and authorization
* AI-based security and privacy
* Anonymity
* Applied cryptography
* Threat scenarios, attack models and security analysis
* Attestation
* Authentication
* Biometrics security and privacy
* Blockchain and cryptocurrencies
* Cloud computing and virtualization security
* Cybercrime and online harms
* Cyber deception and fraud
* Cyber incident response and recovery
* Critical infrastructure protection
* Cyber physical systems security
* Cyber resilience
* Cyber security education, games and awareness
* Cyber threat intelligence
* Data security and privacy
* Digital forensics
* Digital rights management
* Digital watermarking
* Distributed systems security
* Economics of security and privacy
* Edge and fog computing security
* Embedded systems security
* Emergency response and recovery
* Hardware security
* Identity management
* Information security management
* Internet censorship and defence
* Intrusion detection and prevention
* Malware and unwanted software
* Misinformation, disinformation and fake news
* Mobile security and privacy
* Online safety and child protection
* Online social media security, privacy and trust
* Operating systems security
* Network security
* Privacy enhancing technologies and mechanisms
* Security of communication protocols
* Secure information flow
* Security and privacy for (Industrial) Internet of Things
* Security and privacy of AI (e.g., adversarial machine learning and federated learning)
* Security and privacy metrics and policies
* Security operations and incident management
* Security visualization
* Secure systems design and architectures
* Side channel attacks
* Software and application security
* Steganography and steganalysis
* Trusted computing
* Trust management and reputation
* Usable security and privacy
* Web security and privacy

Related Resources

SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
IEEE INCC 2023   IEEE--2023 International Conference on Information Network and Computer Communications (INCC 2023)
NeTCoM 2023   15th International Conference on Networks & Communications
ICICSP--Ei 2023   2023 6th International Conference on Information Communication and Signal Processing (ICICSP 2023)
INCC 2023   IEEE--2023 International Conference on Information Network and Computer Communications (INCC 2023)
AMA 2023   7th International Conference on Applied Mathematics and Sciences
ISCIT 2023   The 22nd International Symposium on Communications and Information Technologies (ISCIT2023)
IEEE ISNCC 2023   2023 International Symposium on Networks, Computers and Communications
SIGML 2023   4th International Conference on Signal Processing and Machine Learning