ICICS 2014 The Sixteenth International Conference on Information and Communications Security

ICICS 2014

The Sixteenth International Conference on Information and Communications Security

Hong Kong, December 16 – 17, 2014.


Call for Papers

Conference Overview

       The 2014 International Conference on Information and Communications Security will be the 16th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.

       ICICS 2014 will be co-organized by the Center for Information Security and Cryptography (CISC), Department of Computer Science, The University of Hong Kong and Institute of Software, Chinese Academy of Sciences (ISCAS), China, sponsored by both National Natural Science Foundation of China and Information Security and Forensics Society (ISFS), Hong Kong.

       Original papers on all aspects of information and communications security are solicited for submission to ICICS2014. Areas of interest include, but are not limited to:

       Security for mobile computing

  •  Access control

  •  Hardware security

  •  Anonymity

  • Information hiding and watermarking

  •  Anti-virus and anti-worms

  • Intellectual property protection

  •  Applied cryptography

  • Intrusion detection

  •   Authentication and authorization

  •  Key management and key recovery

  •   Biometric security

  • Language-based security

  •  Cloud security

  • Network security

  •   Computer and digital forensics

  • Operating systems security

  •  Cyber-physical systems security

  • Privacy protection

  •  Data and system integrity

  •  Risk evaluation and security

  •  Database security

  • Digital currency

  • Security in wearable computing and Internet of things

  •  Distributed systems security

  •  Security models

  • Electronic commerce security

  • Security protocols

  • Engineering issues of cryptographic and security systems

  • Trusted computing and trustworthy computing technology

  • Fraud and cyber-crime

  • Usable security


Instructions for Authors

       Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.

       Submissions should be in English, as a PDF or PS file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 12 A4-sized pages including the bibliography, but excluding well-marked appendices. Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.

       At least one author of each accepted paper should register the conference and give presentation at the conference.

Important Dates

Paper submission deadline: August 15, 2014

Notification of acceptance: September 15, 2014

Camera-ready due: September 31, 2014

Conference: December 16 – 17, 2014

Additional Information

Conference homepage: http://www.cs.hku.hk/icics2014/

Email:   该Email地址已收到反垃圾邮件插件保护。要显示它您需要在浏览器中启用JavaScript。

       Among the preceding conferences, ICICS1997 took place in Beijing, China, ICICS1999 in Sydney, Australia, ICICS2001 in Xi’an, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, ICICS2006 in Raleigh, NC, USA, ICICS2007 in Zhengzhou, China, and ICICS2008 in Birmingham, UK, ICICS2009 in Beijing, China, ICICS2010 in Barcelona, Spain, ICICS2011 in Beijing, China, ICICS2012 in Hong Kong and ICICS2013 in Beijing, China. The proceedings were released as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4381, 5308, 5927, 6476, 7043, 7618, and 8233 of the LNCS series of Springer, respectively.