Sign for Notice Everyday    Sign Up| Sign In| Link|

Our Sponsors

  • ESTA - Electronic System for Travel Authorization
Receive Latest News

Share Us

ICICS 2018 - 20th International Conference on Information and Communications Security

View: 92

Website | Edit Freely

Category cyber security; information security; cryptography

Deadline: June 08, 2018 | Date: October 29, 2018-October 31, 2018

Venue/Country: Lille, France

Updated: 2018-04-21 23:40:17 (GMT+9)

Call For Papers - CFP

**Conference Overview**

The 2018 International Conference on Information and Communications Security will be the 20th event in the ICICS conference series. The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security.

ICICS 2018 will be organized by IMT Lille Douai of Institut Mines-Télécom, the largest engineering graduate school in northern France.

Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2018. Topics of interest include, but are not limited to:

- Access control

- Anonymity

- Applied cryptography

- Authentication and authorization

- Biometrics security

- Blockchain and digital currency security

- Cloud security

- Computer and digital forensics

- Cyber-Physical Systems security

- Data and system integrity

- Database security

- Distributed systems security

- E-Commerce security and trust issues

- Embedded systems security

- Engineering issues of cryptographic protocols and security systems

- Fraud and cyber-crime

- Hardware security

- Identity access management

- Industrial Control Systems security

- Information hiding and watermarking

- Insider threat detection

- Intellectual property protection

- Intrusion detection

- IoT security and privacy

- Key management and key recovery

- Language-based security

- Malware and Anti-malware

- Mobile computing security and privacy

- Network security

- Network Functions Virtualization security

- Operating systems security

- Post-snowden cryptography

- Privacy protection

- Privacy-preserving data mining

- Risk assessment

- Social networks security, privacy and trust

- Software Defined Networking security

- Security management

- Security models, metrics, and policies

- Security and privacy of Big Data

- Security of Critical Infrastructures

- Trust and reputation systems

- Trusted computing and trustworthy computing technologies

- Usable security and privacy

- Underground economy

- Verification of security protocols

- Web security

- Wireless security

**Instruction for Authors**

Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.

Submissions should be in English, as a PDF file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at:, typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions. The manuscripts should be submitted via EasyChair system

Paper accepted by the Program Committee will be presented at ICICS 2018 and included in the conference's proceeding published by Springer in its Lecture Notes in Computer Science series. Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.

**Important Dates**

- Paper submission deadline: June 8, 2018

- Notification of acceptance: July 20, 2018

- Camera-ready due: July 30, 2018

- Conference: October 29-31, 2018

**Confirmed Keynote Speaker**

Speaker: Adrian Perrig, Department of Computer Science at ETH Zürich, Switzerland

Title: Next-Generation Public-Key Infrastructures

**Journal Special Issue**

Selected papers from the conference will be invited to a special issue of the journal Computers & Security (Elsevier).

**Organizing Committee**

Honorary General Chair

- Alain-Louis Schmitt, IMT Lille Douai, Institut Mines-Télécom, France

General Chair

- Zonghua Zhang, IMT Lille Douai, Institut Mines-Télécom, France

General Co-Chair

- Ahmed Meddahi, IMT Lille Douai, Institut Mines-Télécom, France

PC Chairs

- David Naccache, École Normale Supérieure, France

- Shouhuai Xu, University of Texas at San Antonio, USA

PC Co-Chairs

- Sihan Qing, Chinese Academy of Science and Peking University, China

- Pierangela Samarati, Universitàdegli Studi di Milano, Italy

Publication Chairs

- Gregory Blanc, Télécom SudParis, Institut Mines-Télécom, France

- Rongxing Lu, University of New Brunswick, Canada

Publicity Chairs

- Houda Labiod, Télécom ParisTech, Institut Mines-Télécom, France

- Shujun Li, University of Kent, UK

Industry Liaison Chair

- Martine Ducornet, IMT Lille Douai, Institut Mines-Télécom, France

**Contact Organizers**


Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.