posted by user: wonglkd || 5285 views || tracked by 58 users: [display]

CCS 2016 : 23rd ACM Conference on Computer and Communications Security


Conference Series : Computer and Communications Security
When Oct 24, 2016 - Oct 28, 2016
Where Vienna, Austria
Submission Deadline TBD
Categories    security   privacy

Call For Papers

ACM CCS 2016 Call for Papers

23rd ACM Conference on Computer and Communication Security
October 24 - 28, 2016, Hofburg Palace, Vienna, Austria

Paper Submission Due: May 23, 2016 23:59 UTC-11
First round reviews sent to authors: July 5, 2016
Author comments due on: July 8, 2016 23:59 UTC-11
Acceptance Notification: July 22, 2016
Camera Ready Papers Due: August 16, 2016

The ACM CCS conference seeks submissions from academia, government,
and industry presenting novel research results in all practical and
theoretical aspects of computer and communications security. Papers
should be related to the construction, evaluation, application, or
operation of secure systems. Theoretical papers must make a convincing
argument for the relevance of the results to secure systems. All topic
areas related to computer and communications security are of interest
and in scope. Accepted papers will be published by ACM Press in the
conference proceedings.

Paper Submission Process
Submissions must be made by the deadline of Monday, May 23, 2016 23:59 UTC-11.
The review process will be carried out in two phases and authors will
have an opportunity to comment on the first-phase reviews.

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal, conference
or workshop. Simultaneous submission of the same work is not allowed.
Note that submitted papers cannot be withdrawn from the process after
the first phase reviews are received by authors. Authors of accepted
papers must guarantee that their papers will be presented at the

Paper Format
Submissions must be at most 12 pages in double-column ACM format
( proceedings-templates) including
the bibliography and well-marked appendices. Submissions must be
anonymized and avoid obvious self-references. Only PDF files will be
accepted. Submissions not meeting these guidelines risk rejection without
consideration of their merits.

Conflicts of Interest
The program co-chairs require cooperation from both authors and program
committee members to prevent submissions from being evaluated by reviewers
who have a conflict of interest. During the submission process, we will
ask authors to identify members of the program committee with whom they
have a conflict of interest. This includes anyone with close personal
or professional relationship to any of the authors, such as close family
members, people from the same department/group, and recent collaborators
(e.g. collaborated on a joint paper in the last two years). It also
includes anyone in a position of substantial influence on (or by) the a
uthors, such as advisor or advisee (at any time in the past), line-of-management
relationship, grant program manager, etc.

In rare cases, we will allow conflict-of-interest designation due to
personal or professional animosity. In such cases, we require that in
addition to marking the conflict during submission, the authors contact
the program co-chairs by email and explain the reason for this conflict.

Program committee members who have a conflict of interest with a paper,
including program co-chairs, will be excluded from evaluation and
discussion of the paper. In the case of a program co-chair, the other
co-chairs who do not have conflicts will be responsible for managing
that paper.

Related Resources

ACM CCS 2016   23rd ACM Conference on Computer and Communications Security
ACISP 2017   Australasian Conference on Information Security and Privacy
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
SeMoCloud 2017   The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Cloud
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance
HP3C 2017   International Conference on High Performance Compilation, Computing and Communications (HP3C-2017) - ACM, EI and ISI
AEIJ 2016   Advanced Energy: An International Journal