================================================================
CALL FOR PAPERS

ICICS 2018
20th International Conference on Information and Communications Security
Lille, France, October 29-31, 2018
http://conference.imt-lille-douai.fr/icics2018/


Conference Overview
================

The 2018 International Conference on Information and Communications
Security will be the 20th event in the ICICS conference series. The
conference started in 1997 and aims at bringing together leading
researchers and practitioners from both academia and industry to
discuss and exchange their experiences, lessons learned, and insights
related to computer and communications security.

ICICS 2018 will be organized by IMT Lille Douai of Institut
Mines-Télécom, the largest engineering graduate school in northern
France.

Original papers offering novel research contributions on all aspects
of information and communications security are solicited for
submission to ICICS 2018. Topics of interest include, but are not
limited to:

- Access control 
- Anonymity 
- Applied cryptography
- Authentication and authorization
- Biometrics security
- Blockchain and digital currency security
- Cloud security
- Computer and digital forensics 
- Cyber-Physical Systems security
- Data and system integrity
- Database security
- Distributed systems security 
- E-Commerce security and trust issues 
- Embedded systems security 
- Engineering issues of cryptographic protocols and security systems 
- Fraud and cyber-crime
- Hardware security
- Identity access management
- Industrial Control Systems security
- Information hiding and watermarking 
- Insider threat detection 
- Intellectual property protection
- Intrusion detection 
- IoT security and privacy 
- Key management and key recovery 
- Language-based security 
- Malware and Anti-malware 
- Mobile computing security and privacy 
- Network security 
- Network Functions Virtualization security 
- Operating systems security 
- Post-snowden cryptography 
- Privacy protection
- Privacy-preserving data mining
- Risk assessment 
- Social networks security, privacy and trust 
- Software Defined Networking security 
- Security management 
- Security models, metrics, and policies 
- Security and privacy of Big Data 
- Security of Critical Infrastructures 
- Trust and reputation systems 
- Trusted computing and trustworthy computing technologies 
- Usable security and privacy 
- Underground economy 
- Verification of security protocols 
- Web security 
- Wireless security


Instruction for Authors
================

Authors are invited to submit original papers not previously published
nor submitted in parallel for publication to any other conference,
workshop or journal. All submitted papers must be anonymous, with no
author names, affiliations, acknowledgements, or obvious references.

Submissions should be in English, as a PDF file with all fonts
embedded, in the Springer-Verlag LNCS format (details can be found at:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0), typeset
with 11pt font, and using reasonable spacing and margins. Papers
should not exceed 16 pages in LNCS style including the bibliography,
but excluding well-marked appendices (no more than 18 pages in
total). Note that papers should be intelligible without all
appendices, since committee members are not required to read
them. Submitted papers may risk being rejected directly without
consideration of their merits if they do not follow all the above
submission instructions. The manuscripts should be submitted via
EasyChair system https://easychair.org/conferences/?conf=icics2018

Paper accepted by the Program Committee will be presented at ICICS
2018 and included in the conference's proceeding published by Springer
in its Lecture Notes in Computer Science series. Please note that at
least one author of each accepted paper should register with full rate
to the conference and give a presentation at the conference. Failure
to register or absence from the presentation will eventually make your
paper NOT being included in the conference proceedings.


Important Dates
================
- Paper submission deadline:  June 8, 2018 
- Notification of acceptance:  July 20, 2018 
- Camera-ready due:  July 30, 2018
- Conference:  October 29-31, 2018


Confirmed Keynote Speaker
================
Speaker: Adrian Perrig, Department of Computer Science at ETH Zürich, Switzerland

Title: Next-Generation Public-Key Infrastructures


Journal Special Issue
================

Selected papers from the conference will be invited to a special issue
of the journal Computers & Security (Elsevier).


Organizing Committee 
================
Honorary General Chair 
- Alain-Louis Schmitt, IMT Lille Douai, Institut Mines-Télécom, France 

General Chair 
- Zonghua Zhang, IMT Lille Douai, Institut Mines-Télécom, France

General Co-Chair 
- Ahmed Meddahi, IMT Lille Douai, Institut Mines-Télécom, France 

PC Chairs 
- David Naccache, École Normale Supérieure, France 
- Shouhuai Xu, University of Texas at San Antonio, USA 

PC Co-Chairs 
- Sihan Qing, Chinese Academy of Science and Peking University, China 
- Pierangela Samarati, Universitàdegli Studi di Milano, Italy 

Publication Chairs 
- Gregory Blanc, Télécom SudParis, Institut Mines-Télécom, France
- Rongxing Lu, University of New Brunswick, Canada 

Publicity Chairs 
- Houda Labiod, Télécom ParisTech, Institut Mines-Télécom, France
- Shujun Li, University of Kent, UK 

Industry Liaison Chair 
- Martine Ducornet, IMT Lille Douai, Institut Mines-Télécom, France


Contact Organizers
================
Email:  icics2018@imt-lille-douai.fr