ICICS 2007: The 9th International Conference on Information and Communications Security (ICICS 2007)

Venue: Zhengzhou, Henan Province, China

Location: Zhengzhou, Henan Province, China, China

Event Date/Time: Dec 12, 2007
Paper Submission Date: Aug 01, 2007
Report as Spam


The 9th International Conference on Information and Communications Security (ICICS 2007)

12-15 December, 2007

Zhengzhou, Henan Province, China


Conference Outline

The 2007 International Conference on Information and Communications Security will be the 9th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.

Among the preceding conferences, ICICS97 took place in Beijing, China, ICICS99 in Sydney, Australia, ICICS2001 in Xi’an, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, and ICICS2006 in Raleigh, NC, USA. The proceedings were released as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, and 4307 of the LNCS series of Springer, respectively.

ICICS 2007 will be sponsored by Institute of Software, Chinese Academy of Sciences and Institute of Software and Microelectronics, Peking University, and organized by ZhongAn Scientific and Technological Group in co-operation with the National Natural Science Foundation of China (NNSFC), and Informatization Office of Provincial Government of Henan, China.

Conference Topics

Original papers on all aspects of information and communications security are solicited for submission to ICICS 2007. Areas of interests include but not limited to:

Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Applied Cryptography
Biometric Security
Data and System Integrity
Database Security
Distributed Systems Security
Electronic Commerce Security
Fraud Control
Grid Security
Information Hiding and Watermarking
Intellectual Property Protection
Intrusion detection
Key Management and Key Recovery
Language-based Security
Operating System Security
Network Security
Risk Evaluation and Security Certification
Security for Mobile Computing
Security Models
Security Protocols
Trusted Computing

Instructions For Authors

Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Submissions should be in English, in PDF or PS format with all fonts embedded, typeset with 11pt font, and using reasonable spacing and margins. They should not exceed 12 A4-sized pages, not including the bibliography and well-marked appendices. Note that papers should be intelligible without all appendices, since committee members are not required to read them. Submitted papers may risk being rejected directly without consideration of their merits if they do not follow all the above submission instructions.

The Proceedings will be published by Springer-Verlag in their Lecture Notes in Computer Science series, and will be available at the conference. At least one author of each accepted paper should register the conference and give presentation at the conference.

Important Dates
Submissions Due : August 1, 2007
Notification Due : September, 2007
Camera-ready Version Due: 1 Oct., 2007
Conference Dates : 12-15 Dec., 2007

Previous Successes
ICICS '07 is built on the success of the previous eight ICICS conferences.
ICICS '06, Raleigh, USA, December 2006
ICICS '05, Beijing, China, December 2005
ICICS '04, Malaga, Spain, October 2004
ICICS '03, Huhehaote, China, October 2003
ICICS '02, Singapore, December 2002
ICICS '01, Xian, China, November 2001
ICICS '99, Sydney, Australia, November 1999
ICICS '97, Beijing, China, November 1997