ICICS 2021: The 23rd International Conference on Information and Communications Security Chongqing, China, September 17-19, 2021 |
Conference website | https://www.icics.cn/ |
Submission link | https://easychair.org/conferences/?conf=icics20210 |
Submission deadline | May 22, 2021 |
Submission Guidelines
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
Submissions should be in English, as a PDF file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.
Accepted papers will be presented at ICICS 2021 and included in the conference’s post-proceeding published by Springer in its Lecture Notes in Computer Science series. Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.
List of Topics
- Access control and authorization
- Anonymity
- Applied cryptography
- Attacks and defenses
- Authentication
- Biometrics security
- Blockchains and distributed ledger security
- Censorship resistance
- Cloud security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Forensics
- Hardware security
- Intrusion detection and prevention
- Malware and unwanted software
- Mobile and Web security and privacy
- Language-based security
- Machine learning and AI security
- Network and systems security
- Privacy-preserving data mining
- Privacy technologies and mechanisms
- Protocol security
- Secure information flow
- Security and privacy for the Internet of Things
- Security and privacy metrics and policies
- Security architectures
- Social networks security, privacy and trust
- Software and application security
- Usable security and privacy
- Trustworthy computing
Venue
The conference will be held in Chongqing, China.