posted by user: meshekah || 9257 views || tracked by 98 users: [display]

CCS 2015 : 22nd ACM Conference on Computer and Communications Security

FacebookTwitterLinkedInGoogle


Conference Series : Computer and Communications Security
 
Link: http://www.sigsac.org/ccs/CCS2015/index.html
 
When Oct 12, 2015 - Oct 16, 2015
Where Denver, Colorado, US
Submission Deadline May 15, 2015
Notification Due Jul 22, 2015
Final Version Due Aug 12, 2015
Categories    security   privacy
 

Call For Papers

Call for Papers
Paper Submission Information

The conference seeks submissions from academia, government, and industry presenting novel research results in all practical and theoretical aspects of computer and communications security. Papers should be related to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the relevance of the results to secure systems. All topic areas related to computer and communications security are of interest and in scope. Accepted papers will be published by ACM Press in the conference proceedings. Further concrete instructions and submissions rules and regulations will be published in the Call for Papers which will be accessible via the conference web page.
Paper Submission Process

Submissions must be made by the deadline of Friday, May 15, 2015 23:59 (UTC – 11), through ## . The review process will be carried out in two phases and authors will have an opportunity to comment on the first-phase reviews.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Note that submitted papers cannot be withdrawn from the process after the first phase reviews are received by authors. Authors of accepted papers must guarantee that their papers will be presented at the conference.
Paper Format

Submissions must be at most 10 pages in double-column ACM format (http://www.acm.org/sigs/publications/ proceedings-templates) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Dates – Papers
Paper Submission Due May 15, 2015 23:59 (UTC – 11)
First round reviews sent to authors June 30, 2015
Author comments due on July 7, 2015 10:59 (UTC)
Acceptance Notification July 22, 2015
Camera Ready Papers Due August 12, 2015

Related Resources

IWDW2017:CUING 2017   Emerging threats of Criminal Use of Information Hiding (Special Session at IWDW2017)
ACISP 2017   Australasian Conference on Information Security and Privacy
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
USENIX Security 2017   USENIX Security '17
EuropeanSeC 2017   2017 European Security Conference
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
SOUPS 2017   Symposium on Usable Privacy and Security
ICCBDC - ACM 2017   International Conference on Cloud and Big Data Computing (ICCBDC 2017)--Ei Compendex and Scopus
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks