The 2012 International Conference
on Information and Communications Security will be the 14th event in the ICICS
conference series, started in 1997, that brings together individuals involved in
multiple disciplines of Information and Communications Security in order to
foster exchange of ideas.
Among the preceding conferences, ICICS1997 took place in Beijing, China, ICICS1999 in Sydney, Australia, ICICS2001 in Xi’an, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, ICICS2006 in Raleigh, NC, USA, ICICS2007 in Zhengzhou, China, and ICICS2008 in Birmingham, UK, ICICS2009 in Beijing, China, ICICS2010 in Barcelona, Spain and ICICS2011 in Beijing, China. The proceedings were released as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4381, 5308, 5927, 6476 and 7043 of the LNCS series of Springer, respectively. The proceeding of ICICS2012 will be released as Volume 7618 of the LNCS series of Springer.
ICICS 2012 will be co-organized by the Center for Information Security and Cryptography (CISC), Department of Computer Science, the University of Hong Kong and Institute of Software Chinese Academy of Sciences (ISCAS), sponsored by Information Security and Forensics Society (ISFS).
The Proceedings will be published by Springer-Verlag in their Lecture Notes in Computer Science series, and will be available at the conference. At least one author of each accepted paper should register the conference and give presentation at the conference.
Original papers on all aspects of information and communications security are solicited for submission to ICICS2012. Areas of interest include, but are not limited to:
|Access control||Information Hiding and Watermarking|
|Anonymity||Intellectual Property Protection|
|Anti-Virus and Anti-Worms||Intrusion Detection|
|Authentication and Authorization||Key Management and Key Recovery|
|Biometric Security||Language-based Security|
|Computer / Digital Forensics||Network Security|
|Data and System Integrity||Operating System Security|
|Database Security||Privacy Protection|
|Distributed Systems Security||Risk Evaluation and Security Certification|
|Electronic Commerce Security||Security for Mobile Computing|
|Engineering issues of Cryptographic and Security Systems||Security Models|
|Fraud Control||Security Protocols|
|Grid Security||Trusted Computing and trustworthy computing technology|
Last Updated: September 18, 2012.
Contact ICICS 2012