The 19th International Conference on Information and Communications Security

ICICS 2017

Beijing, China    Dec. 6 (Wed.) - Dec. 8 (Fri.), 2017

<

Language: English| 简体中文

Welcome to ICICS 2017

The 2017 International Conference on Information and Communications Security will be the 19th event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.

The submission deadline has changed!

Important Dates

Paper submission deadline: September 15, 2017
Notification of acceptance: October 15, 2017
Camera-ready due: October 28, 2017
Conference: December 6-8, 2017

Previous Conferences

The 2017 International Conference on Information and Communications Security(ICICS 2017) will be the 19th event in the ICICS conference series.

The proceedings were released as the LNCS series of Springer.

ICICS 2016 Singapore LNCS9977
ICICS 2015 Beijing, China LNCS9543
ICICS 2014 Hong Kong, China LNCS8958
ICICS 2013 Beijing, China LNCS8233
ICICS 2012 Hong Kong, China LNCS7618
ICICS 2011 Beijing, China LNCS7043
ICICS 2010 Barcelona, Spain LNCS6476
ICICS 2009 Beijing, China LNCS5927
ICICS 2008 Birmingham, UK LNCS5308
ICICS 2007 Zhengzhou, China LNCS4861
ICICS 2006 Raleigh, USA LNCS4307
ICICS 2005 Beijing, China LNCS3783
ICICS 2004 Malaga, Spain LNCS3269
ICICS 2003 Hohhot, China LNCS2836
ICICS 2002 Singapore LNCS2513
ICICS 2001 Xi'an, China LNCS2229
ICICS 1999 Sydney, Australia LNCS1726
ICICS 1997 Beijing, China LNCS1334

Program Topics

Areas of interest include, but are not limited to, the following topics:

Access control Hardware security
Anonymity Information hiding and watermarking
Anti-virus and anti-worms Intellectual property protection
Applied cryptography Intrusion detection
Authentication and authorization Key management and key recovery
Biometric security Language-based security
Cloud security Network security
Computer and digital forensics Operating systems security
Cyber-physical systems security Privacy protection
Data and system integrity Risk evaluation and security
Database security Security for mobile computing
Digital currency Security in wearable computing and Internet of things
Distributed systems security Security models and Protocols
Electronic commerce security Security and Privacy of Big Data
Engineering issues of cryptographic and security systems Trusted computing and trustworthy computing technology
Fraud and cyber-crime Usable security

Co-organizer

IIE

Institute of Information Engineering, CAS

PKU

Peking University

ISCAS

Institute of Software, CAS