posted by user: gblanc || 4104 views || tracked by 15 users: [display]

ICICS 2018 : The 20th International Conference on Information and Communications Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information and Communication Security
 
Link: http://conference.imt-lille-douai.fr/icics2018/
 
When Oct 29, 2018 - Oct 31, 2018
Where Lille, France
Submission Deadline Jun 8, 2018
Notification Due Jul 20, 2018
Final Version Due Jul 30, 2018
Categories    security   communications   information technology   networking
 

Call For Papers

================================================================
CALL FOR PAPERS

ICICS 2018
20th International Conference on Information and Communications Security
Lille, France, October 29-31, 2018
http://conference.imt-lille-douai.fr/icics2018/


Conference Overview
================
The 2018 International Conference on Information and Communications Security will be the 20th event in the ICICS conference series. The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security.

ICICS 2018 will be organized by IMT Lille Douai of Institut Mines-Télécom, the largest engineering graduate school in northern France.

Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2018. Topics of interest include, but are not limited to:

- Access control
- Anonymity
- Applied cryptography
- Authentication and authorization
- Biometrics security
- Blockchain and digital currency security
- Cloud security
- Computer and digital forensics
- Cyber-Physical Systems security
- Data and system integrity
- Database security
- Distributed systems security
- E-Commerce security and trust issues
- Embedded systems security
- Engineering issues of cryptographic protocols and security systems
- Fraud and cyber-crime
- Hardware security
- Identity access management
- Industrial Control Systems security
- Information hiding and watermarking
- Insider threat detection
- Intellectual property protection
- Intrusion detection
- IoT security and privacy
- Key management and key recovery
- Language-based security
- Malware and Anti-malware
- Mobile computing security and privacy
- Network security
- Network Functions Virtualization security
- Operating systems security
- Post-snowden cryptography
- Privacy protection
- Privacy-preserving data mining
- Risk assessment
- Social networks security, privacy and trust
- Software Defined Networking security
- Security management
- Security models, metrics, and policies
- Security and privacy of Big Data
- Security of Critical Infrastructures
- Trust and reputation systems
- Trusted computing and trustworthy computing technologies
- Usable security and privacy
- Underground economy
- Verification of security protocols
- Web security
- Wireless security


Instruction for Authors
================
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.

Submissions should be in English, as a PDF file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions. The manuscripts should be submitted via EasyChair system https://easychair.org/conferences/?conf=icics2018

Paper accepted by the Program Committee will be presented at ICICS 2018 and included in the conference's proceeding published by Springer in its Lecture Notes in Computer Science series. Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.


Important Dates
================
- Paper submission deadline: June 22, 2018 (extended)
- Notification of acceptance: July 27, 2018 (extended)
- Camera-ready due: August 6, 2018 (extended)
- Conference: October 29-31, 2018


Confirmed Keynote Speaker
================
Speaker #1: Adrian Perrig, Department of Computer Science at ETH Zürich, Switzerland
Title: Next-Generation Public-Key Infrastructures
Speaker #2: Eric Freyssinet, Chief digital strategy officer, National Gendarmerie (gendarmerie nationale), France
Title: TBD


Journal Special Issue
================
Selected papers from the conference will be invited to a special issue of the journal Computers & Security (Elsevier).


Organizing Committee
================
Honorary General Chair
- Alain-Louis Schmitt, IMT Lille Douai, Institut Mines-Télécom, France

General Chair
- Zonghua Zhang, IMT Lille Douai, Institut Mines-Télécom, France

General Co-Chair
- Ahmed Meddahi, IMT Lille Douai, Institut Mines-Télécom, France

PC Chairs
- David Naccache, École Normale Supérieure, France
- Shouhuai Xu, University of Texas at San Antonio, USA

PC Co-Chairs
- Sihan Qing, Chinese Academy of Science and Peking University, China
- Pierangela Samarati, Universitàdegli Studi di Milano, Italy

Publication Chairs
- Gregory Blanc, Télécom SudParis, Institut Mines-Télécom, France
- Rongxing Lu, University of New Brunswick, Canada

Publicity Chairs
- Houda Labiod, Télécom ParisTech, Institut Mines-Télécom, France
- Shujun Li, University of Kent, UK

Industry Liaison Chair
- Martine Ducornet, IMT Lille Douai, Institut Mines-Télécom, France


Technical Program Committee
================
- Gregory Blanc, Télécom SudParis, Institut Mines-Télécom, France
- Joonsang Baek, University of Wollongong, Australia
- Gouenou Coatrieux, IMT Atlantique, Institut Mines-Télécom, France
- Frédéric Cuppens, IMT Atlantique, Institut Mines-Télécom, France
- Nora Cuppens-Boulahia, IMT Atlantique, Institut Mines-Télécom, France
- Zhenfu Cao, East China Normal University, China
- Haixin Duan, Tsinghua University, China
- Jean-Luc Danger, Télécom ParisTech, Institut Mines-Télécom, France
- Antony Fleury, IMT Lille Douai, Institut Mines-Télécom, France
- Doudou Fall, NAIST, Japan
- Angelo Genovese, Università degli Studi di Milano, Italy
- Debin Gao, Singapore Management University, Singapore
- Dieter Gollmann, Hamburg University of Technology, Germany
- Joaquin Garcia-Alfaro, Télécom SudParis, Institut Mines-Télécom, France
- Hongxin Hu, Clemson University, USA
- Shouling Ji, Zhejiang University, China
- Nizar Kheir, Thales, France
- Sokratis K. Katsikas, Norwegian University of Science & Technology (NTNU), Norway
- Houda Labiod, Télécom ParisTech, Institut Mines-Télécom, France
- Maryline Laurent, Télécom SudParis, Institut Mines-Télécom, France
- Shujun Li, University of Kent, UK
- Yang Liu, Nanyang Technological University, Singapore
- Giovanni Livrava, Università degli Studi di Milano, Italy
- Rongxing Lu, University of New Brunswick, Canada
- Xiaodong Lin, Wilfrid Laurier University, Canada
- Atsuko Miyaji, Osaka University/JAST, Japan
- Aziz Mohaisen, University of Central Florida, USA
- Jean-Yves Marion, LORIA, France
- Zhe Liu, NUAA, China and Univ. of Luxembourg
- David Naccache, École normale supérieure, France
- Takashi Nishide, University of Tsukuba, Japan
- Sihan Qing, Chinese Academy of Sciences and Peking University, China
- Cauchie Stéphane, equensWorldline, France
- Chunhua Su, University of Aizu, Japan
- Mario Südholt, IMT Atlantique, France
- Pierangela Samarati, Università degli Studi di Milano, Italy
- Sandra Scott-Hayward, Queen’s University Belfast, UK
- Seungwon Shin, KAIST, Korea
- Zhiyong Shan, Wichita State University, USA
- Juan Tapiador, Universidad Carlos III de Madrid, Spain
- Qiang Tang, LIST, Luxembourg
- Wei Wang, Beijing Jiaotong University, China
- Lei Xu, University of Houston, USA
- Shouhuai Xu, University of Texas at San Antonio, USA
- Guanyuan Yan, Binghamton University, State University of New York, USA
- Min Yang, Fudan University, China
- Fengwei Zhang, Wayne State University, USA
- Haojin Zhu, Shanghai Jiaotong University, China
- Yongbin Zhou, IIE, Chinese Academy of Sciences, China


Contact Organizers
================
Email: icics2018@imt-lille-douai.fr

Related Resources

SECITC 2018   11th International Conference on Security for Information Technology and Communications
IJGTT 2018   International Journal of Game Theory and Technology
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
RASS 2018   Special issue on Recent Advances in Software Security - EURASIP Journal on Information Security
SCSN 2019   International Workshop on Semantic Computing for Social Networks and Organization Sciences: from user information to social knowledge
NECO 2018   7thInternational Conference of Networks and Communications
ACM--ICDSP--EI, Scopus 2019   ACM--2019 3rd International Conference on Digital Signal Processing (ICDSP 2019)--Ei Compendex and Scopus
IJIST 2018   The International Journal of Information Science & techniques
ICDSP--ACM, EI, Scopus 2019   ACM--2019 3rd International Conference on Digital Signal Processing (ICDSP 2019)--Ei Compendex and Scopus
C2SI 2019   3rd International Conference on Codes, Cryptology and Information Security