第12届国际信息与通信安全会议 ICICS2010 征文通知

Conference Topics

    Original papers on all aspects of Information and Communications Security are solicited for submission to ICICS 2010. This international conference will be the 12th event in the ICICS series, started in 1997, which will bring together individuals involved in multiple disciplines to foster exchange of ideas.
    Topics of interest include, but are not limited to, access control, anonymity and privacy, applied cryptography, biometric security, data and system integrity, fraud control, information hiding, intrusion detection, key management and recovery, risk evaluation, watermarking and digital fingerprinting, and security certification. Security applications of interest comprise, among others, computer networks, databases, distributed systems and grid computing, e-commerce, e-voting, intellectual property, mobile computing, and software protection.

Instructions for Authors

    Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
    Submissions should be in English, as a PDF or PS file with all fonts embedded, in the Springer-Verlag LNCS format, typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 12 A4-sized pages including the bibliography, but excluding well-marked appendices. Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.

Important Dates

Paper submission deadline       July 15, 2010
Notification of acceptance     September 20, 2010
Camera-ready due     October 5, 2010
Conference     December 15-17, 2010

Conference Committee

Complete List      http://www.icics2010.org/committee
Program Co-Chairs
Sihan Qing     Peking University, China
Miguel Soriano     Universitat Politècnica de Catalunya, Spain
General Chair
Javier López     University of Málaga, Spain

Additional Information

WWW:     www.icics2010.org
eMail:     icics2010@entel.upc.edu

(责任编辑:)

分享到:

更多
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
  • 微笑/wx
  • 撇嘴/pz
  • 抓狂/zk
  • 流汗/lh
  • 大兵/db
  • 奋斗/fd
  • 疑问/yw
  • 晕/y
  • 偷笑/wx
  • 可爱/ka
  • 傲慢/am
  • 惊恐/jk
用户名: 验证码:点击我更换图片
资料下载专区
图文资讯

2015网络安全(中国)论坛8月在上海举办

2014未来物联网与大数据技术与应用论坛——

“第三届中国大数据应用论坛”7月即将开幕

“第三届中国信息安全人才培养与就业工作研

下一代互联网信息安全专项产品测试工作部署

返回首页 返回顶部