[agents] CFP: SpaCCS 2020 (*deadline extended*: Jun 23, 2020), Nanjing, China

Marco Guazzone marco.guazzone at di.unipmn.it
Tue May 26 15:12:36 EDT 2020


################################################################################
13th International Conference on Security, Privacy and Anonymity in 
Computation,
Communication and Storage (SpaCCS 2020)

Nanjing, China. October 23-25, 2020
################################################################################

URL: http://www.spaccs2020.com/


IMPORTANT DATES

* Submission Deadline: Jun 23, 2020 (*Firm Deadline*)
* Authors Notification Date: Jul 23, 2020
* Final Manuscript Due: Aug 23, 2020
* Author Registration Due: Aug 23, 2020
* Conference Dates: Oct 23-25, 2020


CALL FOR PAPERS

The SpaCCS 2020 conference is the 13th event in the series of 
conferences which are devoted to security, privacy and anonymity in 
computation, communication and storage. SpaCCS is now recognized as the 
main regular event of the world that is covering many dimensions 
including security algorithms and architectures, privacy-aware policies, 
regulations and techniques, anonymous computation and communication, 
encompassing fundamental theoretical approaches, practical experimental 
projects, and commercial application systems for computation, 
communication and storage. As applications of computer systems and 
networks have permeated in every aspect of our daily life, the issues of 
security, privacy, and anonymity have become increasingly critical. The 
conference will provide a forum for the world-class researchers to 
gather and share their research achievements, emerging ideas and trends 
in the highly challenging research fields.

==================
Topics of interest include, but are not limited to:
==================

Track1: Security

- Security Model and Architecture
- Software and System Security
- Secure computation
- Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
- Artificial Intelligence
- Secure Network Computing
- Risk Analysis and Management
- Network Security
- Malware and Botnets
- Intrusion Detection
- Security in Web Services
- Security in Mobile Social Networks
- Security in Mobile and Wireless Communications
- Fraud and Cyber-Crime
- Access Control
- Accounting and Audit
- Applied Cryptography
- Database Security
- Authentication
- Computer forensics
- Data Protection and Data Integrity
- Digital Content Protection and Digital Forensics
- Information Hiding
- Security in Big Data and its Applications

Track 2: Privacy

- Measuring and Quantifying Privacy
- Privacy Modelling and Analysis
- Software and System Privacy
- Privacy-preserving Computing
- Differential Privacy
- Blockchain
- Privacy-enhanced Network Computing
- Obfuscation-based Privacy
- Cryptographic Tools
- Building and Deploying Privacy-enhancing Systems
- Reliability, Robustness, and Abuse Prevention in Privacy Systems
- Privacy in Web Services
- Privacy Metrics and Policies
- Crowdsourcing for Privacy
- Location and Mobility Privacy
- Privacy in Cloud and Big Data Applications
- Quantum Communications
- Privacy in Ubiquitous Computing and Mobile Devices
- Privacy in Social Networks and Microblogging Systems
- Privacy-enhanced Access Control, Authentication, and Identity Management
- Policy Languages and Tools for Privacy
- Interdisciplinary Research Connecting Privacy to Other Fields
- Information Leakage, Data Correlation and Generic Attacks to Privacy
- Privacy-Preserving Data Mining, Data Release and Publishing

Track 3: Anonymity

- Anonymous Data Mining and Data Sharing
- Parallelism Exploitation Techniques for Anonymity
- Anonymity in Big Data Analytics
- Anonymous Management in Trust Relationships
- Anonymous Video Analytics Technology
- Anonymity Metrics, Measures and Evaluations
- Anonymity Models, Hardware/Device of Anonymity
- Anonymity in Wireless Communication Systems
- Anonymous Communication Protocols
- Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
- Anonymous Proxy Software
- Anonymous Communication and Internet
- Anonymous Social Networks, Structural k-Anonymity in Social Networks
- Authentication Protocol Providing User Anonymity
- Anonymous Information Storage and Management
- Private and Anonymous Data Storage
- Forensics
- Anonymity-Preserving Data Collection and Database
- Anonymity, Pseudonymity & Identity Management
- Anonymity in Big Data and Cloud Scenarios
- Anonymity in Health and Medical Databases


==================
Paper Submission
==================

All papers need to be submitted electronically through the conference 
website (https://easychair.org/conferences/?conf=spaccs2020) with PDF 
format. Submitted papers must not substantially overlap with papers that 
have been published or that are simultaneously submitted to a journal or 
a conference with proceedings. Papers must be clearly presented in 
English, must not exceed 14 pages (or up to 20 pages with the pages over 
length charge) in Springer LNCS format 
(https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines), 
including tables, figures, references and appendices. Papers will be 
selected based on their originality, significance, relevance, and 
clarity of presentation assessed by at least three reviewers. Submission 
of a paper should be regarded as a commitment that, should the paper be 
accepted, at least one of the authors will register and attend the 
conference to present the work.

All accepted papers will be published by Springer LNCS (EI Indexed). 
Best Paper Awards will be presented to high quality papers. 
Distinguished papers, after further revisions, will be published in SCI 
& EI indexed prestigious journals (More special issues will be added later).


==================
Special Issues
==================

1. Future Generation Computer Systems
  Special Issue on Artificial Intelligence: The Security & Privacy 
Opportunities and Challenges for Emerging Applications
  https://www.journals.elsevier.com/future-generation-computer-systems/call-for-papers/the-security-privacy-opportunities
  Publisher: Elsevier, IF: 5.768

2. IEEE Access
  Special section on Internet-of-Things Attacks and Defenses: Recent 
Advances and Challenges
  https://ieeeaccess.ieee.org/special-sections/internet-of-things-attacks-and-defenses-recent-advances-and-challenges
  Publisher: IEEE, IF: 4.098

3. Computer Standards & Interfaces
  Special Issue on Security, Privacy and Trust for Intelligence IoT 
Devices and Systems
  Publisher: Elsevier, IF: 2.441

4. Symmetry
  Special Issue: Special issue on Symmetry and Asymmetry in IoT and CPS 
Security and Privacy
  https://www.mdpi.com/journal/symmetry/special_issues/IoT_and_CPS
  Publisher: MDPI, IF: 2.143

5. Multimedia Tools and Applications
  Special Issue: Blockchain-based multimedia security(SI:1159T)
  https://www.springer.com/journal/11042/updates/17192684
  Publisher: Springer, IF = 2.101

6. International Journal of Distributed Sensor Networks
  Special Issue: Security and Privacy in Internet of Things
  https://journals.sagepub.com/page/dsn/collections/special-issues/security-and-privacy-in-internet-of-things
  Publisher: SAGE journals, IF = 1.614

7. Wireless Communications and Mobile Computing (WCMC) Journal
  Special Issue: Security and Privacy in New Computing Environments
  https://www.hindawi.com/journals/wcmc/
  Publisher: Hindawi, IF: 1.396

8. Security and Communication Networks
  Special Issue: Machine Learning for Wireless Multimedia Data Security
  https://www.hindawi.com/journals/scn/2019/7682306
  Publisher: Hindawi, IF: 1.376

9. Security and Communication Networks
  Special Issue: Trustworthy Networking for Beyond 5G Networks 2020
  https://www.hindawi.com/journals/scn/si/908361/
  Publisher: Hindawi, IF: 1.376

10. Concurrency and Computation Practice and Experience, IOS Press
  Special Issue: Special Issue on Secure Smart World (S2World2020)
  http://www.cc-pe.net/journalinfo/issues/2020.html
  Publisher: WILEY, IF: 1.114

11. IEICE Transactions on Information and Systems
  Special Section on Blockchain Systems and Applications
  Publisher: IEICE, IF: 0.576

12. Digital Communications and Networks
  Special Issue: Security and Privacy Protection in the Era of IoT Devices
  http://www.keaipublishing.com/en/journals/digital-communications-and-networks/call-for-papers/special-issue-on-security-and-privacy-protection/
  Publisher: KeAi

13. Information
  Special Issue: Security and Privacy in the Internet of Things
  https://www.mdpi.com/journal/information/special_issues/Security_Privacy_in_IoT
  Publisher: MDPI


ORGANIZING COMMITTEE

General Chairs
- Zhiqiu Huang, Nanjing University of Aeronautics and Astronautics
- Zhipeng Cai, Georgia State University
- Xuefeng Yan, Nanjing University of Aeronautics and Astronautics
- Aniello Castiglione, University of Naples Parthenope

Program Chairs
- Guojun Wang, Guangzhou University
- Bing Chen, Nanjing University of Aeronautics and Astronautics
- Wei Li, Georgia State University
- Roberto Di Pietro, Hamad Bin Khalifa University

Program Vice Chair/Track Chair
- Fengyuan Xu, Nanjing University
- Shouling Ji, Zhejiang University
- Lu Zhou, Nanjing University of Aeronautics and Astronautics
- Willy Susilo, University of Wollongong


Workshop Chair
- Ryan Ko, University of Queensland

Publicity Chairs
- Xin Li, Nanjing University of Aeronautics and Astronautics
- Alberto Huertas Celdr´an, Waterford Institute of Technology
- Shuhong Chen, Guangzhou University
- Marco Guazzone, University of Piemonte Orientale
- Yan Huang, Kennesaw State University
- Weizhi Meng, Technical University of Denmark

Local Chairs
- Kun Zhu, Nanjing University of Aeronautics and Astronautics
- Hao Han, Nanjing University of Aeronautics and Astronautics

Publication Chairs
- Tao Peng, Guangzhou University
- Xiaofei Xing, Guangzhou University

Registration Chair
- Chunpeng Ge, Nanjing University of Aeronautics and Astronautics

Conference Secretariat
- Liming Fang, Nanjing University of Aeronautics and Astronautics

Web Chair
- Ran Wang, Nanjing University of Aeronautics and Astronautics

Steering Committee
- Guojun Wang, Guangzhou University, China (Chair)
- Gregorio Martinez, University of Murcia, Spain (Chair)
- Jinjun Chen, Swinburne University of Technology, Australia
- Weijia Jia, University of Macau, Macau
- Ryan Ko, Queensland University, Australia
- Constantinos Kolias, University of Idaho, USA
- Jianbin Li, North China Electric Power University, China
- Jie Li, Shanghai Jiao Tong University, China
- Yang Xiang, Swinburne University of Technology, Australia
- Zheng Yan, Aalto University, Finland/Xidian University, China
- Wanlei Zhou, University of Technology Sydney, Australia
- Mario Freire, The University of Beira Interior, Portuga
- Minyi Guo, Shanghai Jiao Tong University, China
- Wei Jie, University of West London, UK
- Georgios Kambourakis, University of the Aegean, Greece
- Jianhua Ma, Hosei University, Japan
- Felix Gomez Marmol, University of Murcia, Spain
- Geyong Min, University of Exeter, UK
- Peter Mueller, IBM Zurich Research Laboratory, Switzerland
- Indrakshi Ray, Colorado State University, USA
- Kouichi Sakurai, Kyushu University, Japan
- Juan E. Tapiador, The University Carlos III of Madrid, Spain
- Sabu M. Thampi, Indian Institute of Information Technology and 
Management, India
- Jie Wu, Temple University, USA
- Yang Xiang, Swinburne University of Technology, Australia
- Laurence T. Yang, St. Francis Xavier University, Canada

-- 
Marco Guazzone, PhD
Computer Science Institute, DiSIT
University of Piemonte Orientale
address: Viale T. Michel 11, 15121 Alessandria, Italy
phone: +39-0131-360484
web: http://people.unipmn.it/sguazt



More information about the agents mailing list