The 2018 International Conference on Information and Communications Security will be the 20th event in the ICICS conference series. The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security.
Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2018.
|Access control||Key management and key recovery|
|Applied cryptography||Malware and Anti-malware|
|Authentication and authorization||Mobile computing security and privacy|
|Biometrics security||Network security|
|Blockchain and digital currency security||Network Functions Virtualization security|
|Cloud security||Operating systems security|
|Computer and digital forensics||Post-snowden cryptography|
|Cyber-Physical Systems security||Privacy protection|
|Data and system integrity||Privacy-preserving data mining|
|Database security||Risk assessment|
|Distributed systems security||Social networks security, privacy and trust|
|E-Commerce security and trust issues||Software Defined Networking security|
|Embedded systems security||Security management|
|Engineering issues of cryptographic protocols
and security systems
|Security models, metrics, and policies|
|Fraud and cyber-crime||Security and privacy of Big Data|
|Hardware security||Security of Critical Infrastructures|
|Identity access management||Trust and reputation systems|
|Industrial Control Systems security||Trusted computing and trustworthy
|Information hiding and watermarking||Usable security and privacy|
|Insider threat detection||Underground economy|
|Intellectual property protection||Verification of security protocols|
|Intrusion detection||Web security|
|IoT security and privacy||Wireless security|
Instructions for Authors
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
Submissions should be in English, as a PDF file with all fonts embedded, in the Springer-Verlag LNCS format (details can be found at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset with 11pt font, and using reasonable spacing and margins. Papers should not exceed 16 pages in LNCS style including the bibliography, but excluding well-marked appendices (no more than 18 pages in total). Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.
The manuscripts should be submitted via EasyChair system.
Paper accepted by the Program Committee will be presented at ICICS 2018 and included in the conference’s proceeding published by Springer in its Lecture Notes in Computer Science series. Please note that at least one author of each accepted paper should register with full rate to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.
Journal Special Issue
Selected papers from the conference will be invited to a special issue of the journal Computers & Security (Elsevier).