posted by user: wonglkd || 4550 views || tracked by 56 users: [display]

CCS 2016 : 23rd ACM Conference on Computer and Communications Security


Conference Series : Computer and Communications Security
When Oct 24, 2016 - Oct 28, 2016
Where Vienna, Austria
Submission Deadline TBD
Categories    security   privacy

Call For Papers

ACM CCS 2016 Call for Papers

23rd ACM Conference on Computer and Communication Security
October 24 - 28, 2016, Hofburg Palace, Vienna, Austria

Paper Submission Due: May 23, 2016 23:59 UTC-11
First round reviews sent to authors: July 5, 2016
Author comments due on: July 8, 2016 23:59 UTC-11
Acceptance Notification: July 22, 2016
Camera Ready Papers Due: August 16, 2016

The ACM CCS conference seeks submissions from academia, government,
and industry presenting novel research results in all practical and
theoretical aspects of computer and communications security. Papers
should be related to the construction, evaluation, application, or
operation of secure systems. Theoretical papers must make a convincing
argument for the relevance of the results to secure systems. All topic
areas related to computer and communications security are of interest
and in scope. Accepted papers will be published by ACM Press in the
conference proceedings.

Paper Submission Process
Submissions must be made by the deadline of Monday, May 23, 2016 23:59 UTC-11.
The review process will be carried out in two phases and authors will
have an opportunity to comment on the first-phase reviews.

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal, conference
or workshop. Simultaneous submission of the same work is not allowed.
Note that submitted papers cannot be withdrawn from the process after
the first phase reviews are received by authors. Authors of accepted
papers must guarantee that their papers will be presented at the

Paper Format
Submissions must be at most 12 pages in double-column ACM format
( proceedings-templates) including
the bibliography and well-marked appendices. Submissions must be
anonymized and avoid obvious self-references. Only PDF files will be
accepted. Submissions not meeting these guidelines risk rejection without
consideration of their merits.

Conflicts of Interest
The program co-chairs require cooperation from both authors and program
committee members to prevent submissions from being evaluated by reviewers
who have a conflict of interest. During the submission process, we will
ask authors to identify members of the program committee with whom they
have a conflict of interest. This includes anyone with close personal
or professional relationship to any of the authors, such as close family
members, people from the same department/group, and recent collaborators
(e.g. collaborated on a joint paper in the last two years). It also
includes anyone in a position of substantial influence on (or by) the a
uthors, such as advisor or advisee (at any time in the past), line-of-management
relationship, grant program manager, etc.

In rare cases, we will allow conflict-of-interest designation due to
personal or professional animosity. In such cases, we require that in
addition to marking the conflict during submission, the authors contact
the program co-chairs by email and explain the reason for this conflict.

Program committee members who have a conflict of interest with a paper,
including program co-chairs, will be excluded from evaluation and
discussion of the paper. In the case of a program co-chair, the other
co-chairs who do not have conflicts will be responsible for managing
that paper.

Related Resources

ACM CCS 2016   23rd ACM Conference on Computer and Communications Security
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ICCV 2017   International Conference on Computer Vision
IJMSA 2016   International Journal of Modelling, Simulation and Applications
ICML 2017   34th International Conference on Machine Learning
ANCS 2017   The 13th ACM/IEEE Symposium on Architectures for Networking and Communications Systems