Visible to the public Call For Papers: The 2018 International Conference on Information and Communications Security (ICICS'2018)Conflict Detection Enabled

No replies
shouhuai's picture
Offline
Established Community Member
Joined: Sep 19 2013

CALL FOR PAPERS - Paper submission deadline: June 22, 2018

The 2018 International Conference on Information and Communications Security (ICICS'2018)

Lille, France; October 29-31, 2018

Conference website: http://conference.imt-lille-douai.fr/icics2018/

Important Dates

  • Paper submission deadline: June 8, 2018, 23:59:59, June 22, 2018, 23:59:59, Anywhere on earth (UTC -12)
  • Acceptance notification: July 27, 2018
  • Camera ready due: August 06, 2018
  • Conference: October 29-31, 2018

The 2018 International Conference on Information and Communications Security will be the 20th event in the ICICS conference series. The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security.

ICICS 2018 will be organized by IMT Lille Douai of Institut Mines-Telecom, the largest engineering graduate school in northern France.

Keynotes

Next-Generation Public-Key Infrastructures
Speaker: Adrian Perrig

Title TBD
Speaker: Eric Freyssinet

Conference Topics

  • Access control Key management and key recovery
  • Anonymity Language-based security
  • Applied cryptography Malware and Anti-malware
  • Authentication and authorization Mobile computing security and privacy
  • Biometrics security Network security
  • Blockchain and digital currency security Network Functions Virtualization security
  • Cloud security Operating systems security
  • Computer and digital forensics Post-snowden cryptography
  • Cyber-Physical Systems security Privacy protection
  • Data and system integrity Privacy-preserving data mining
  • Database security Risk assessment
  • Distributed systems security Social networks security, privacy and trust
  • E-Commerce security and trust issues Software Defined Networking security
  • Embedded systems security Security management
  • Engineering issues of cryptographic protocols
  • and security systems Security models, metrics, and policies
  • Fraud and cyber-crime Security and privacy of Big Data
  • Hardware security Security of Critical Infrastructures
  • Identity access management Trust and reputation systems
  • Industrial Control Systems security Trusted computing and trustworthy
  • computing technologies
  • Information hiding and watermarking Usable security and privacy
  • Insider threat detection Underground economy
  • Intellectual property protection Verification of security protocols
  • Intrusion detection Web security
  • IoT security and privacy Wireless security

Instructions for Authors

Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.

Submissions should be in English, as a PDF file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.

The manuscripts should be submitted via EasyChair system.

Paper accepted by the Program Committee will be presented at ICICS 2018 and included in the conference's proceeding published by Springer in its Lecture Notes in Computer Science series. Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.