[agents] CFP: SpaCCS 2020 (deadline: May 23, 2020), Nanjing, China
Marco Guazzone
marco.guazzone at di.unipmn.it
Sat Mar 7 10:30:56 EST 2020
################################################################################
13th International Conference on Security, Privacy and Anonymity in
Computation,
Communication and Storage (SpaCCS 2020)
Nanjing, China. October 23-25, 2020
################################################################################
URL: http://www.spaccs2020.com/
==================
IMPORTANT DATES
==================
* Submission Deadline: May 23, 2020
* Authors Notification Due: July 23, 2020
* Final Version Due: August 23, 2020
==================
CALL FOR PAPERS
==================
The SpaCCS 2020 conference is the 13th event in the series of
conferences which are devoted to security, privacy and anonymity in
computation, communication and storage. SpaCCS is now recognized as the
main regular event of the world that is covering many dimensions
including security algorithms and architectures, privacy-aware policies,
regulations and techniques, anonymous computation and communication,
encompassing fundamental theoretical approaches, practical experimental
projects, and commercial application systems for computation,
communication and storage. As applications of computer systems and
networks have permeated in every aspect of our daily life, the issues of
security, privacy, and anonymity have become increasingly critical. The
conference will provide a forum for the world-class researchers to
gather and share their research achievements, emerging ideas and trends
in the highly challenging research fields.
==================
Topics of interest include, but are not limited to:
==================
Track1: Security
- Security Model and Architecture
- Software and System Security
- Secure computation
- Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
- Artificial Intelligence
- Secure Network Computing
- Risk Analysis and Management
- Network Security
- Malware and Botnets
- Intrusion Detection
- Security in Web Services
- Security in Mobile Social Networks
- Security in Mobile and Wireless Communications
- Fraud and Cyber-Crime
- Access Control
- Accounting and Audit
- Applied Cryptography
- Database Security
- Authentication
- Computer forensics
- Data Protection and Data Integrity
- Digital Content Protection and Digital Forensics
- Information Hiding
- Security in Big Data and its Applications
Track 2: Privacy
- Measuring and Quantifying Privacy
- Privacy Modelling and Analysis
- Software and System Privacy
- Privacy-preserving Computing
- Differential Privacy
- Blockchain
- Privacy-enhanced Network Computing
- Obfuscation-based Privacy
- Cryptographic Tools
- Building and Deploying Privacy-enhancing Systems
- Reliability, Robustness, and Abuse Prevention in Privacy Systems
- Privacy in Web Services
- Privacy Metrics and Policies
- Crowdsourcing for Privacy
- Location and Mobility Privacy
- Privacy in Cloud and Big Data Applications
- Quantum Communications
- Privacy in Ubiquitous Computing and Mobile Devices
- Privacy in Social Networks and Microblogging Systems
- Privacy-enhanced Access Control, Authentication, and Identity Management
- Policy Languages and Tools for Privacy
- Interdisciplinary Research Connecting Privacy to Other Fields
- Information Leakage, Data Correlation and Generic Attacks to Privacy
- Privacy-Preserving Data Mining, Data Release and Publishing
Track 3: Anonymity
- Anonymous Data Mining and Data Sharing
- Parallelism Exploitation Techniques for Anonymity
- Anonymity in Big Data Analytics
- Anonymous Management in Trust Relationships
- Anonymous Video Analytics Technology
- Anonymity Metrics, Measures and Evaluations
- Anonymity Models, Hardware/Device of Anonymity
- Anonymity in Wireless Communication Systems
- Anonymous Communication Protocols
- Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
- Anonymous Proxy Software
- Anonymous Communication and Internet
- Anonymous Social Networks, Structural k-Anonymity in Social Networks
- Authentication Protocol Providing User Anonymity
- Anonymous Information Storage and Management
- Private and Anonymous Data Storage
- Forensics
- Anonymity-Preserving Data Collection and Database
- Anonymity, Pseudonymity & Identity Management
- Anonymity in Big Data and Cloud Scenarios
- Anonymity in Health and Medical Databases
==================
Paper Submission
Paper Submission
==================
All papers need to be submitted electronically through the conference
website (https://easychair.org/conferences/?conf=spaccs2020) with PDF
format. Submitted papers must not substantially overlap with papers that
have been published or that are simultaneously submitted to a journal or
a conference with proceedings. Papers must be clearly presented in
English, must not exceed 14 pages (or up to 20 pages with the pages over
length charge) in Springer LNCS format
(https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines),
including tables, figures, references and appendices. Papers will be
selected based on their originality, significance, relevance, and
clarity of presentation assessed by at least three reviewers. Submission
of a paper should be regarded as a commitment that, should the paper be
accepted, at least one of the authors will register and attend the
conference to present the work.
All accepted papers will be published by Springer LNCS (EI Indexed).
Best Paper Awards will be presented to high quality papers.
Distinguished papers, after further revisions, will be published in SCI
& EI indexed prestigious journals (More special issues will be added later).
All accepted papers will be published by Springer LNCS (EI Indexed).
Best Paper Awards will be presented to high quality papers.
Distinguished papers, after further revisions, will be published in SCI
& EI indexed prestigious journals (More special issues will be added later).
==================
Special Issues
==================
1. Future Generation Computer Systems
Special Issue on Artificial Intelligence: The Security & Privacy
Opportunities and Challenges for Emerging Applications
https://www.journals.elsevier.com/future-generation-computer-systems/call-for-papers/the-security-privacy-opportunities
Publisher: Elsevier, IF: 4.639
2. IEEE Access
Special section on IoT attacks and defence
https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639
Publisher: IEEE, IF: 4.098
3. Multimedia Tools and Applications
Special Issue: Blockchain-based multimedia security(SI:1159T)
https://www.springer.com/journal/11042/updates/17192684
Publisher: Springer, IF = 2.101
4. International Journal of Distributed Sensor Networks
Special Issue: Security and Privacy in Internet of Things
https://journals.sagepub.com/page/dsn/collections/special-issues/security-and-privacy-in-internet-of-things
Publisher: SAGE journals, IF = 1.614
5. Wireless Communications and Mobile Computing (WCMC) Journal
Special Issue: Security and Privacy in New Computing Environments
https://www.hindawi.com/journals/wcmc/
Publisher: Hindawi, IF: 1.396
6. Security and Communication Networks
Special Issue: Machine Learning for Wireless Multimedia Data Security
https://www.hindawi.com/journals/scn/2019/7682306
Publisher: Hindawi, IF: 1.376
7. Concurrency and Computation Practice and Experience, IOS Press
Special Issue: Special Issue on Secure Smart World (S2World2020)
http://www.cc-pe.net/journalinfo/issues/2020.html
Publisher: WILEY, IF: 1.114
8. Connection Science
https://www.tandfonline.com/loi/ccos20
Publisher: Taylor & Francis Online, IF: 0.673
9. Digital Communications and Networks
Special Issue: Security and Privacy Protection in the Era of IoT Devices
http://www.keaipublishing.com/en/journals/digital-communications-and-networks/call-for-papers/special-issue-on-security-and-privacy-protection/
Publisher: KeAi
--
Marco Guazzone, PhD
Computer Science Institute, DiSIT
University of Piemonte Orientale
address: Viale T. Michel 11, 15121 Alessandria, Italy
phone: +39-0131-360484
web: http://people.unipmn.it/sguazt
More information about the agents
mailing list