ICICS'11

          Thirteenth International Conference on Information and Communications Security

          November 23-26, 2011, Beijing, China

 

ICICS 2011 - Conference Outline

The 2011 International Conference on Information and Communications Security will be the 13th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.

      Among the preceding conferences, ICICS97 took place in Beijing, China, ICICS99 in Sydney, Australia, ICICS2001 in Xi’an, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, ICICS2006 in Raleigh, NC, USA, ICICS2007 in Zhengzhou, China, and ICICS2008 in Birmingham, UK, ICICS2009 in Beijing, China, and ICICS2010 in Barcelona, Spain. The proceedings were releases as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4381, 5308, 5927 and 6476 of the LNCS series of Springer, respectively.

      ICICS 2011 will be sponsored and organized by Institute of Software, Chinese Academy of Sciences and Institute of Software and Microelectronics, Peking University in co-operation with the National Natural Science Foundation of China (NNSFC).

      The Proceedings will be published by Springer-Verlag in their   Lecture Notes in Computer Science series, and will be available at the conference. At least one author of each accepted paper should register the conference and give presentation at the conference.

      Original papers on all aspects of information and communications security are solicited for submission to ICICS2011. Areas of interest include, but are not limited to:            

 

 

 

Access control

Intellectual Property Protection

Anti-Virus and Anti-Worms

Intrusion Detection

Anonymity

Key Management and Key Recovery

Authentication and Authorization

Language-based Security

Biometric Security

Operating System Security

Data and System Integrity

Network Security

Database Security

Risk Evaluation and Security Certification

Distributed Systems Security

Security for Mobile Computing

Electronic Commerce Security

Security Models

Fraud Control

Security Ptotocols

Grid Security

Trusted Computing and trustworthy computing technology

Information Hiding and Watermarking

 


 

 

Contact the Webmaster | Contact ICICS 2011