posted by user: mobilenetwork || 8493 views || tracked by 10 users: [display]

ICICS 2020 : 22nd International Conference on Information and Communications Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information and Communication Security
 
Link: http://icics2020.compute.dtu.dk/
 
When Aug 24, 2020 - Aug 27, 2020
Where copenhagen, Denmark
Submission Deadline Mar 23, 2020
Notification Due May 8, 2020
Categories    security
 

Call For Papers

The 2020 International Conference on Information and Communications Security will be the 22nd event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas. There will be Best Paper and Best Student Paper awards with cash reward sponsored by Springer. It will be organized by Technical University of Denmark (DTU).

Program Topics:

Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2019. Areas of interest include, but are not limited to:

Access control
Social networks security, privacy and trust
Key management and key recovery
Software defined networking security
Anonymity
Embedded systems security
Language-based security
Security management
Applied cryptography
Security models, metrics, and policies
Malware and anti-malware
Fraud and cyber-crime
Authentication and authorization
Security and privacy of Big Data
Mobile computing security and privacy
Hardware security
Biometrics security
Security of critical Infrastructures
Network security
Identity access management
Blockchain security and privacy
Trust and reputation systems
Cloud and edge computing security
Trusted and trustworthy computing technologies
Operating systems security
Usable security and privacy
Computer and digital forensics
Insider threat detection
Cyber-physical systems security
Underground economy
Privacy protection
Intellectual property protection
Data and system integrity
Verification of security protocols
Privacy-preserving data mining
Intrusion detection
Database security
Web security
Risk assessment
IoT security and privacy
Distributed systems security
Wireless security

Instructions for Authors:

Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.

Submissions should be in English, as a PDF file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.

Accepted papers will be presented at ICICS 2020 and included in the conference's post-proceeding published by Springer in its Lecture Notes in Computer Science series. Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.

General Chairs
- Christian D. Jensen, Technical University of Denmark, Denmark
- Jianying Zhou, Singapore University of Technology and Design, Singapore

Program Chairs
- Dieter Gollmann, Hamburg University of Technology, Germany
- Weizhi Meng, Technical University of Denmark, Denmark

If there is any question, please contact us at: icics2020-1@easychair.org.

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
SECRYPT 2022   19th International Conference on Security and Cryptography
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
IEEE MAPE--EI Compendex, Scopus 2022   2022 IEEE the 9th International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications (IEEE MAPE 2022)--EI Compendex, Scopus
AutonomousVehicles 2022   Special Issue - Autonomous Vehicles for Public Transportation Services