ICSDP2022: International Conference on Security and Data Privacy Sri Sivasubramaniya Nadar College of Engineering Chennai, India, September 5-7, 2022 |
Conference website | http://sites.google.com/view/icsdp |
Submission link | https://easychair.org/conferences/?conf=icsdp2022 |
Abstract registration deadline | June 1, 2022 |
Submission deadline | June 15, 2022 |
Submission Guidelines
This conference aims to bring together scientists, researchers from academia, industry, government to share their knowledge by submitting and presenting their research skills on all theoretical and practical aspects of security and data privacy. Practitioners and industry representatives are also encouraged to submit papers.
Instructions for Paper Submission
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
Submissions should be in English, as a PDF file with all fonts embedded, in the Springer format. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.
Accepted papers will be presented at ICSDP 2022 and included in the conference’s publication (waiting for approval). Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.
List of Topics
- Access control and authentication
- Attacks and defensesMalware and unwanted software
- Applied cryptography
- Crowdsourcing
- Privacy-enhancing technologies
- Privacy protection and Privacy-by-design
- Distributed systems security
- Blockchains and distributed ledger security
- Critical infrastructure protection
- Embedded systems security
- Forensics
- Audit and risk analysis
- Network and systems security
- Data privacyData and applications security
- Cloud security and privacy
- Trust management
- Privacy technologies and mechanisms
- Security and privacy, metrics and policies
- Social networks security, privacy and trust
- Usable security and privacy
- Economics of security and privacy
- Cyber physical systems security
- Intrusion detection and prevention
- Security and privacy for the Internet of Things
- Privacy-preserving data mining
Contact
Contact the conference chairs if there are questions about the submission through the email-id, security-conf@ssn.edu.in