ICICS 2017: The 19th International Conference on Information and Communications Security Beijing, China, December 6-8, 2017 |
Conference website | http://icics.cn |
Submission link | https://easychair.org/conferences/?conf=icics20172 |
Abstract registration deadline | September 25, 2017 |
Submission deadline | September 25, 2017 |
The 19th International Conference on Information and Communications Security
ICICS 2017
Beijing, China Dec. 6 (Wed.) - Dec. 8 (Fri.), 2017
Conference Overview
The 2017 International Conference on Information and Communications Security will be the 19th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.
ICICS 2017 will be co-organized by Institute of Software, Chinese Academy of Sciences, School of Software and Microelectronics, Peking University and Institute of Information Engineering, Chinese Academy of Sciences, sponsored by the National Natural Science Foundation of China.
Original papers on all aspects of information and communications security are solicited for submission to ICICS2017. Areas of interest include, but are not limited to:
Access control | Hardware security |
Anonymity | Information hiding and watermarking |
Anti-virus and anti-worms | Intellectual property protection |
Applied cryptography | Intrusion detection |
Authentication and authorization | Key management and key recovery |
Biometric security | Language-based security |
Cloud security | Network security |
Computer and digital forensics | Operating systems security |
Cyber-physical systems security | Privacy protection |
Data and system integrity | Risk evaluation and security |
Database security | Security for mobile computing |
Digital currency | Security in wearable computing and Internet of things |
Distributed systems security | Security models and Protocols |
Electronic commerce security | Security and Privacy of Big Data |
Engineering issues of cryptographic and security systems | Trusted computing and trustworthy computing technology |
Fraud and cyber-crime | Usable security |
Instructions for Authors
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
Submissions should be in English, as a PDF or PS file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 12 A4-sized pages including the bibliography, but excluding well-marked appendices. Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.
At least one author of each accepted paper should register the conference and give presentation at the conference.
Important Dates
Paper submission deadline: | September 15, 2017 |
Notification of acceptance: | October 15, 2017 |
Camera-ready due: | October 28, 2017 |
Conference: | December 6-8, 2017 |
Additional Information
Conference homepage: http://ICICS.cn/
Email: icics@iie.ac.cn
ICICS has taken place in a number of different countries including China (1997, 2001, 2003, 2005, 2007, 2009, 2011, 2013, 2015), Australia (1999), Hong Kong (2012, 2014), Singapore (2002, 2016), Spain (2004, 2010), USA (2006), and UK (2008). The proceedings were releases as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4861, 5308, 5927, 6476, 7043, 7618, 8233, 8958, 9543 and 9977 of the LNCS series of Springer, respectively.