ICICS 2012 : International Conference on Information and Communications Security
Conference Series : International Conference on Information and Communication Security
Call For Papers
The 2012 International Conference on Information and Communications Security will be the 14th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.
Among the preceding conferences, ICICS1997 took place in Beijing, China, ICICS1999 in Sydney, Australia, ICICS2001 in Xi’an, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, ICICS2006 in Raleigh, NC, USA, ICICS2007 in Zhengzhou, China, and ICICS2008 in Birmingham, UK, ICICS2009 in Beijing, China, ICICS2010 in Barcelona, Spain and ICICS2011 in Beijing, China. The proceedings were releases as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4381, 5308, 5927, 6476 and 7043 of the LNCS series of Springer, respectively.
ICICS 2012 will be sponsored and organized by the Center for Information Security and Cryptography (CISC), Department of Computer Science, The University of Hong Kong.
The Proceedings will be published by Springer-Verlag in their Lecture Notes in Computer Science series, and will be available at the conference. At least one author of each accepted paper should register the conference and give presentation at the conference.
Original papers on all aspects of information and communications security are solicited for submission to ICICS2012. Areas of interest include, but are not limited to:
Access control Information Hiding and Watermarking
Anonymity Intellectual Property Protection
Anti-Virus and Anti-Worms Intrusion Detection
Authentication and Authorization Key Management and Key Recovery
Biometric Security Language-based Security
Computer / Digital Forensics Network Security
Data and System Integrity Operating System Security
Database Security Privacy Protection
Distributed Systems Security Risk Evaluation and Security Certification
Electronic Commerce Security Security for Mobile Computing
Engineering issues of Cryptographic and Security Systems Security Models
Fraud Control Security Protocols
Grid Security Trusted Computing and trustworthy computing technology
Instructions for Authors
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
Submissions should be in English, as a PDF or PS file with all fonts embedded, in the Springer-Verlag LNCS format, typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 12 A4-sized pages including the bibliography, but excluding well-marked appendices. Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.
Paper submission deadline: May 25, 2012
Notification of acceptance: July 20, 2012
Camera-ready due: August 10, 2012
Conference: October 29 – 31, 2012
Conference homepage: http://www.cs.hku.hk/icics2012/