posted by organizer: franciscosu1981 || 5717 views || tracked by 14 users: [display]

ISPEC 2016 : The 12th International Conference on Information Security Practice and Experience

FacebookTwitterLinkedInGoogle


Conference Series : Information Security Practice and Experience
 
Link: http://trust.csu.edu.cn/conference/ispec2016/
 
When Nov 16, 2016 - Nov 18, 2016
Where Zhangjiajie, China
Submission Deadline Jul 1, 2016
Notification Due Aug 15, 2016
Final Version Due Sep 15, 2016
Categories    information security   network secuirty   system secuirty   cryptography
 

Call For Papers

------------------------------------------------------------------------------------------
Part I: Call for Papers, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016
------------------------------------------------------------------------------------------
The 12th International Conference on
Information Security Practice and Experience
(ISPEC 2016)

Organizers:
Central South University, China
Guangzhou University, China
Jishou University, China

Technical Co-Sponsorship:
HUAWEI Company, China
Springer Lecture Notes in Computer Science (LNCS)

Venue & Dates:
Zhangjiajie, China, November 16-18, 2016

http://trust.csu.edu.cn/conference/ISPEC2016/

------------------------------------------------------------------------------------------
Introduction
ISPEC is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. The previous ISPEC conference series were successfully held in Singapore, Hangzhou, Hong Kong, Sydney, Xi'an, Seoul, Guangzhou, Hangzhou, Lanzhou, Fuzhou and Beijing. The twelfth ISPEC will be held in Zhangjiajie, China, November 16-18, 2016. ISPEC 2016 will be hosted by Central South University, China.


Scope and Interests
Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to:
- Access control
- Applied cryptography
- Availability, resilience, and usability
- Big data and Cloud security
- Cryptanalysis
- Embedded system security
- Database security
- Digital Forensics
- Digital rights management
- Information security in vertical applications
- Intrusion detection
- Multimedia security
- Network security
- Privacy and anonymity
- Risk evaluation and security certification
- Security for cyber-physical systems
- Security of smart cards and RFID systems
- Security policy
- Security protocols
- Security systems
- Smart Grid Security
- Smartphone Security
- Trust model and management
- Trusted computing


Submission and Publication Information
All papers need to be submitted electronically through the conference website (https://easychair.org/conferences/?conf=ispec2016) with PDF format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 14 pages or 20 pages with the over length charge in Springer LNCS format, including tables, figures, references and appendixes. Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. ISPEC 2016 reserves the right to exclude a paper from distribution after the conference (e.g., removal from the digital library and index service), if the paper is not presented at the conference. All accepted papers will be published by Springer LNCS (EI Indexed). One outstanding paper will be selected to receive the Best Paper Award.


Important Dates
(1) Workshop Proposal Deadline: March 1, 2016
(2) Paper Submission Deadline: July 1, 2016
(3) Author Notification: August 15,2016
(4) Camera-ready Papers Due: September 15, 2016
(5) Conference Dates: November 16-18, 2016


General Chairs
Guojun Wang, Central South University, China

Related Resources

SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
IEEE--ICCT--Ei and Scopus 2019   2019 19th IEEE International Conference on Communication Technology (ICCT 2019)--Ei Compendex and Scopus
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
CryBlockSpecial 2018   Cryptocurrencies and Blockchains for Distributed Systems, (special issue) Concurrency and Computation: Practice and Experience, Wiley
ICICM--Ei & Scopus 2019   2019 The 9th International Conference on Information Communication and Management (ICICM 2019)--Ei Compendex, Scopus
CRIS 2019   International Conference on Cryptography and Information Security
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
SECRYPT 2019   International Conference on Security and Cryptography