| |||||||||||||||
ASIACCS 2011 : The 6th ACM Symposium on Information, Computer and Communications SecurityConference Series : ACM Symposium on Information, Computer and Communications Security | |||||||||||||||
Link: http://www.cs.hku.hk/asiaccs2011/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)
22 - 24 March 2011 Admiralty Learning Centre, Hong Kong, China Web Page: http://www.cs.hku.hk/asiaccs2011/ Contact: asiaccs2011@cs.hku.hk Call for Papers =============== Overview -------- To build on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then the ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009) and Beijing (2010). ASIACCS 2011 is the sixth conference of the series. ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Topics ------ Areas of interest for ASIACCS 2011 include, but are not limited to: - anonymity - inference/controlled disclosure - cryptographic protocols - access control - intellectual-property protection - data/system integrity - secure networking - digital-rights management - information warfare - accounting and audit - trusted computing - formal methods for security - key management - phishing and countermeasures - identity management - intrusion detection - commercial and industry security - security in ubiquitous computing, e.g., RFIDs - authentication - security management - smartcards - web security - security and privacy for emerging technologies, e.g., VoIP, peer-to-peer and overlay network systems, Web 2.0 - data and application security - applied cryptography - malware and botnets - mobile-computing security - privacy-enhancing technology - software security Instructions for Authors ------------------------ Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered), excluding the bibliography and well-marked appendices and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. All submissions must be anonymized (an author's name should only occur in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others). Only PDF or Postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. All papers should be submitted through the website: http://www.easychair.org/conferences/?conf=asiaccs2011 Papers must be written in English. We require that the authors use the ACM format for papers, using one of the ACM SIG Proceeding Templates (http://www.acm.org/sigs/pubs/proceed/template.html). Accepted papers will be published by ACM Press in conference proceedings and in the ACM Digital Library, which is indexed by EI. Final proceedings versions will be 10 pages in double-column ACM format; although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some short papers could also be accepted and included in the proceedings. Important Dates --------------- Submission Deadline (extended): 8 October 2010, 23:59 UTC Acceptance Notification: 3 December 2010 Camera-ready Copy Due: 20 December 2010 Conference: 22 - 24 March 2011 Best Paper Award ---------------- The Program Committee is planning to give Best Paper Awards to the best conference paper. (Details to be announced.) Organizers ---------- Organized By: Department of Computer Science, The University of Hong Kong, China Supported By: - Center for Information Security and Cryptography (CISC), HKU, China - School of Professional and Continuing Education (SPACE), HKU, China - Department of Computer Science, City University of Hong Kong, China Honorary Chair: Way Kuo (President of City University of Hong Kong, China) General Co-Chairs: Bruce Cheung (The University of Hong Kong, China), Lucas Hui (The University of Hong Kong, China) Program Co-Chairs: Ravi Sandhu (University of Texas, San Antonio), Duncan S. Wong (City University of Hong Kong, China) Local Organizing Chair: S. M. Yiu (The University of Hong Kong, China) Steering Committee ------------------ Shiuhpyng Shieh (Chair) (NCTU, Taiwan) Elisa Bertino (Purdue University, USA) Mike Reiter (University of North Carolina at Chapel Hill, USA) Ninghui Li (Purdue University, USA) Eiji Okamoto (University of Tsukuba, Japan) Li Gong (Mozilla Online Ltd., USA) Vijay Varadharajan (Macquarie University, Australia) David Basin (ETH, Switzerland) Robert Deng (SMU, Singapore) Virgil Gligor (CMU, USA) Hideki Imai (AIST, Japan) Sushil Jajodia (GMU, USA) Pierangela Samarati (University of Milan, Italy) Program Committee ----------------- Vijay Atluri (Rutgers Univ., USA) Michael Backes (Saarland Univ. and MPI-SWS, Germany) Joonsang Baek (I2R, Singapore) David Basin (ETH Zurich, Switzerland) Colin Boyd (QUT, Australia) David Brumley (Carnegie Mellon Univ., USA) Mike Burmester (Florida State Univ., USA) Zhenfu Cao (Shanghai Jiao Tong Univ., China) Srdjan Capkun (ETH Zurich, Switzerland) Kefei Chen (Shanghai Jiao Tong Univ., China) Liqun Chen (HP Labs, UK) Tzi-cker Chiueh (Stony Brook Univ., USA) Marc Dacier (Symantec Research Labs Europe) Robert Deng (SMU, Singapore) Feng Bao (I2R, Singapore) Dengguo Feng (Chinese Academy of Sciences, China) Eiichiro Fujisaki (NTT Labs, Japan) Jun Furukawa (NEC, Japan) David Galindo (Univ. of Luxembourg, Luxembourg) Virgil Gligor (Carnegie Mellon Univ., USA) Guofei Gu (Texas A&M Univ., USA) Qijun Gu (Texas State Univ., USA) Apu Kapadia (Indiana Univ., USA) Kwangjo Kim (KAIST, Korea) Adam J. Lee (Univ. of Pittsburgh, USA) Yingjiu Li (SMU, Singapore) Dongdai Lin (Chinese Academy of Sciences, China) Peng Liu (Pennsylvania State Univ., USA) Mark Manulis (TU Darmstadt, Germany) Sjouke Mauw (Univ. of Luxembourg, Luxembourg) Catherine Meadows (Naval Research Laboratory, USA) Chris Mitchell (Royal Holloway, Univ. of London, UK) Yi Mu (Univ. of Wollongong, Australia) David Naccache (ENS, France) Eiji Okamoto (Univ. of Tsukuba, Japan) Panagiotis Papadimitratos (EPFL Lausanne, Switzerland) Josef Pieprzyk (Macquarie Univ., Australia) Alexander Pretschner (Karlsruhe Institute of Technology, Germany) Kui Ren (Illinois Institute of Technology, USA) Michael Rusinowitch (LORIA-INRIA-Lorraine, France) Rei Safavi-Naini (Univ. of Calgary, Canada) Pierangela Samarati (Univ. of Milan, Italy) Shiuhpyng Shieh (Chiao Tung Univ., Chinese Taipei) Sean W. Smith (Dartmouth College, USA) Anna Squicciarini (Pennsylvania State Univ., USA) Willy Susilo (Univ. of Wollongong, Australia) Tsuyoshi Takagi (Kyushu Univ., Japan) Bhavani Thuraisingham (Univ. of Texas, Dallas, USA) Dongyan Xu (Purdue Univ., USA) Damien Vergnaud (ENS, France) Xun Yi (Victoria Univ., Australia) Fangguo Zhang (Sun Yat-sen Univ., China) Jianying Zhou (I2R, Singapore) |
|