第12届国际信息与通信安全会议 ICICS2010 征文通知

Conference Topics

    Original papers on all aspects of Information and Communications Security are solicited for submission to ICICS 2010. This international conference will be the 12th event in the ICICS series, started in 1997, which will bring together individuals involved in multiple disciplines to foster exchange of ideas.
    Topics of interest include, but are not limited to, access control, anonymity and privacy, applied cryptography, biometric security, data and system integrity, fraud control, information hiding, intrusion detection, key management and recovery, risk evaluation, watermarking and digital fingerprinting, and security certification. Security applications of interest comprise, among others, computer networks, databases, distributed systems and grid computing, e-commerce, e-voting, intellectual property, mobile computing, and software protection.

Instructions for Authors

    Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
    Submissions should be in English, as a PDF or PS file with all fonts embedded, in the Springer-Verlag LNCS format, typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 12 A4-sized pages including the bibliography, but excluding well-marked appendices. Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.

Important Dates

Paper submission deadline       July 15, 2010
Notification of acceptance     September 20, 2010
Camera-ready due     October 5, 2010
Conference     December 15-17, 2010

Conference Committee

Complete List      http://www.icics2010.org/committee
Program Co-Chairs
Sihan Qing     Peking University, China
Miguel Soriano     Universitat Politècnica de Catalunya, Spain
General Chair
Javier López     University of Málaga, Spain

Additional Information

WWW:     www.icics2010.org
eMail:     icics2010@entel.upc.edu

(责任编辑:)

分享到:

更多
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
  • 微笑/wx
  • 撇嘴/pz
  • 抓狂/zk
  • 流汗/lh
  • 大兵/db
  • 奋斗/fd
  • 疑问/yw
  • 晕/y
  • 偷笑/wx
  • 可爱/ka
  • 傲慢/am
  • 惊恐/jk
用户名: 验证码:点击我更换图片
资料下载专区
图文资讯

2015网络安全(中国)论坛8月在上海举办

2015网络安全(中国)论坛8月在上海举办

“互联网+”时代,移动互联网已进化为生产型的移动互联网,云计算、物联网、大数据、...[详细]

2014未来物联网与大数据技术与应用论坛——

2014未来物联网与大数据技术与应用论坛——暨低碳高端智慧园区发展研讨会

2014未来物联网与大数据技术与应用论坛暨低碳高端智慧园区发展研讨会于2014年12月21日...[详细]

“第三届中国大数据应用论坛”7月即将开幕

“第三届中国大数据应用论坛”7月即将开幕

大数据技术已经在互联网上取得了广泛的应用,然而随着智能设备的普及和高带宽的快速发...[详细]

“第三届中国信息安全人才培养与就业工作研

“第三届中国信息安全人才培养与就业工作研讨暨交流会”通知

在国家信息安全保障战略中,信息安全人才的培养一直是重要的组成部分。目前,我国信息...[详细]

下一代互联网信息安全专项产品测试工作部署

下一代互联网信息安全专项产品测试工作部署会在京顺利召开

为了加快我国下一代互联网发展的工作部署,进一步提升下一代互联网信息安全产品的技术...[详细]

返回首页 返回顶部