ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICICS 2014 - 16th International Conference on Information and Communications Security

Date2014-12-16 - 2014-12-17

Deadline2014-08-15

VenueHong Kong, Hong Kong SAR Hong Kong SAR

Keywords

Websitehttps://www.cs.hku.hk/icics2014

Topics/Call fo Papers

The 2014 International Conference on Information and Communications Security will be the 16th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.
Among the preceding conferences, ICICS1997 took place in Beijing, China, ICICS1999 in Sydney, Australia, ICICS2001 in Xian, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, ICICS2006 in Raleigh, NC, USA, ICICS2007 in Zhengzhou, China, and ICICS2008 in Birmingham, UK, ICICS2009 in Beijing, China, ICICS2010 in Barcelona, Spain, ICICS2011 in Beijing, China, ICICS2012 in Hong Kong and ICICS2013 in Beijing, China. The proceedings were released as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4381, 5308, 5927, 6476, 7043, 7618 and 8233 of the LNCS series of Springer, respectively. The Proceedings of ICICS2014 will also be published by Springer-Verlay in their Lecture Notes in Computer Science series (www.springer.com/lncs).
ICICS 2014 will be co-organized by the Center for Information Security and Cryptography (CISC), Department of Computer Science, the University of Hong Kong and Institute of Software, Chinese Academy of Sciences (ISCAS), sponsored by both National Natural Science Foundation of China and Information Security and Forensics Society (ISFS), Hong Kong.
Original papers on all aspects of information and communications security are solicited for submission to ICICS2014. Areas of interest include, but are not limited to:
Access control
Anonymity
Anti-virus and anti-worms
Applied cryptography
Authentication and authorization
Biometric security
Cloud security
Computer and digital forensics
Cyber-physical systems security
Data and system integrity
Database security
Digital currency
Distributed systems security
Electronic commerce security
Engineering issues of cryptographic and security systems
Fraud and cyber-crime
Hardware security
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management and key recovery
Language-based security
Network security
Operating systems security
Privacy protection
Risk evaluation and security
Security for mobile computing
Security in wearable computing and Internet of things
Security models
Security protocols
Trusted computing and trustworthy computing technology
Usable security

Last modified: 2014-07-08 17:17:09