The 2014 International Conference
on Information and Communications Security will be the 16th event in the ICICS
conference series, started in 1997, that brings together individuals involved in
multiple disciplines of Information and Communications Security in order to
foster exchange of ideas.
Among the preceding conferences, ICICS1997 took place in Beijing, China, ICICS1999 in Sydney, Australia, ICICS2001 in Xian, China, ICICS2002 in Singapore, ICICS2003 in Huhehaote city, China, ICICS2004 in Malaga, Spain, ICICS2005 in Beijing, China, ICICS2006 in Raleigh, NC, USA, ICICS2007 in Zhengzhou, China, and ICICS2008 in Birmingham, UK, ICICS2009 in Beijing, China, ICICS2010 in Barcelona, Spain, ICICS2011 in Beijing, China, ICICS2012 in Hong Kong and ICICS2013 in Beijing, China. The proceedings were released as Volumes 1334, 1726, 2229, 2513, 2836, 3269, 3783, 4307, 4381, 5308, 5927, 6476, 7043, 7618 and 8233 of the LNCS series of Springer, respectively. The Proceedings of ICICS2014 will also be published by Springer-Verlay in their Lecture Notes in Computer Science series (www.springer.com/lncs).
ICICS 2014 will be co-organized by the Center for Information Security and Cryptography (CISC), Department of Computer Science, the University of Hong Kong and Institute of Software, Chinese Academy of Sciences (ISCAS), sponsored by both National Natural Science Foundation of China and Information Security and Forensics Society (ISFS), Hong Kong.
Original papers on all aspects of information and communications security are solicited for submission to ICICS2014. Areas of interest include, but are not limited to:
Anti-virus and anti-worms
Authentication and authorization
Computer and digital forensics
Cyber-physical systems security
Data and system integrity
Distributed systems security
Electronic commerce security
Engineering issues of cryptographic and security systems
Fraud and cyber-crime
Information hiding and watermarking
Intellectual property protection
Key management and key recovery
Operating systems security
Risk evaluation and security
Security for mobile computing
Security in wearable computing and Internet of things
Trusted computing and trustworthy computing technology
Last Updated: July 4, 2014.
Contact ICICS 2014