| |||||||||||
CCS 2016 : 23rd ACM Conference on Computer and Communications SecurityConference Series : Computer and Communications Security | |||||||||||
Link: http://www.sigsac.org/ccs/CCS2016/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
ACM CCS 2016 Call for Papers
23rd ACM Conference on Computer and Communication Security October 24 - 28, 2016, Hofburg Palace, Vienna, Austria Paper Submission Due: May 23, 2016 23:59 UTC-11 First round reviews sent to authors: July 5, 2016 Author comments due on: July 8, 2016 23:59 UTC-11 Acceptance Notification: July 22, 2016 Camera Ready Papers Due: August 16, 2016 The ACM CCS conference seeks submissions from academia, government, and industry presenting novel research results in all practical and theoretical aspects of computer and communications security. Papers should be related to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the relevance of the results to secure systems. All topic areas related to computer and communications security are of interest and in scope. Accepted papers will be published by ACM Press in the conference proceedings. Paper Submission Process ------------------------ Submissions must be made by the deadline of Monday, May 23, 2016 23:59 UTC-11. The review process will be carried out in two phases and authors will have an opportunity to comment on the first-phase reviews. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Note that submitted papers cannot be withdrawn from the process after the first phase reviews are received by authors. Authors of accepted papers must guarantee that their papers will be presented at the conference. Paper Format ------------ Submissions must be at most 12 pages in double-column ACM format (http://www.acm.org/sigs/publications/ proceedings-templates) including the bibliography and well-marked appendices. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Conflicts of Interest --------------------- The program co-chairs require cooperation from both authors and program committee members to prevent submissions from being evaluated by reviewers who have a conflict of interest. During the submission process, we will ask authors to identify members of the program committee with whom they have a conflict of interest. This includes anyone with close personal or professional relationship to any of the authors, such as close family members, people from the same department/group, and recent collaborators (e.g. collaborated on a joint paper in the last two years). It also includes anyone in a position of substantial influence on (or by) the a uthors, such as advisor or advisee (at any time in the past), line-of-management relationship, grant program manager, etc. In rare cases, we will allow conflict-of-interest designation due to personal or professional animosity. In such cases, we require that in addition to marking the conflict during submission, the authors contact the program co-chairs by email and explain the reason for this conflict. Program committee members who have a conflict of interest with a paper, including program co-chairs, will be excluded from evaluation and discussion of the paper. In the case of a program co-chair, the other co-chairs who do not have conflicts will be responsible for managing that paper. |
|