Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    ICICS 2012 - International Conference on Information and Communications Security

    View: 1535

    Website www.cs.hku.hk/icics2012/ | Want to Edit it Edit Freely

    Category ICICS 2012

    Deadline: June 12, 2012 | Date: October 29, 2012-October 31, 2012

    Venue/Country: Hong Kong, Hong Kong

    Updated: 2012-05-25 15:12:53 (GMT+9)

    Call For Papers - CFP

    The 2012 International Conference on Information and Communications Security will be the 14th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.

    Among the preceding conferences, ICICS1997 took place in Beijing, China, ICICS1999 in Sydney, Australia, ICICS2001 in Xi’an, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, ICICS2006 in Raleigh, NC, USA, ICICS2007 in Zhengzhou, China, and ICICS2008 in Birmingham, UK, ICICS2009 in Beijing, China, ICICS2010 in Barcelona, Spain and ICICS2011 in Beijing, China. The proceedings were releases as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4381, 5308, 5927, 6476 and 7043 of the LNCS series of Springer, respectively.

    ICICS 2012 will be sponsored and organized by the Center for Information Security and Cryptography (CISC), Department of Computer Science, The University of Hong Kong.

    The Proceedings will be published by Springer-Verlag in their Lecture Notes in Computer Science series, and will be available at the conference. At least one author of each accepted paper should register the conference and give presentation at the conference.

    Original papers on all aspects of information and communications security are solicited for submission to ICICS2012. Areas of interest include, but are not limited to:

    Access control Information Hiding and Watermarking

    Anonymity Intellectual Property Protection

    Anti-Virus and Anti-Worms Intrusion Detection

    Authentication and Authorization Key Management and Key Recovery

    Biometric Security Language-based Security

    Computer / Digital Forensics Network Security

    Data and System Integrity Operating System Security

    Database Security Privacy Protection

    Distributed Systems Security Risk Evaluation and Security Certification

    Electronic Commerce Security Security for Mobile Computing

    Engineering issues of Cryptographic and Security Systems Security Models

    Fraud Control Security Protocols

    Grid Security Trusted Computing and trustworthy computing technology


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.