<html><head></head><body><div style="color:#000; background-color:#fff; font-family:Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:13px"><div id="yui_3_16_0_ym19_1_1501480455281_4466" dir="ltr">*****************************************************************************************************************<br id="yui_3_16_0_ym19_1_1501480455281_5285">We apologize if you receive multiple copies of this SpaCCS 2017 CFP with 11+ Keynotes & 14+ SIs.<br id="yui_3_16_0_ym19_1_1501480455281_5286">We appreciate your great help if you forward this SpaCCS 2017 CFP to your colleagues and friends.<br id="yui_3_16_0_ym19_1_1501480455281_5287">*****************************************************************************************************************<br id="yui_3_16_0_ym19_1_1501480455281_5288">-----------------------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5289">Part I: Call for Papers, SpaCCS 2017, Guangzhou, China, December 12-15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5290">-----------------------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5291">Call for Papers for the 10th International Conference on Security, Privacy and Anonymity <br id="yui_3_16_0_ym19_1_1501480455281_5292">in Computation, Communication and Storage (SpaCCS 2017) --- Paper Submission Deadline extended to August 15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5293"><br id="yui_3_16_0_ym19_1_1501480455281_5294">Organizers:<br id="yui_3_16_0_ym19_1_1501480455281_5295">Guangzhou University, China<br id="yui_3_16_0_ym19_1_1501480455281_5296">Central South University, China<br id="yui_3_16_0_ym19_1_1501480455281_5297"><br id="yui_3_16_0_ym19_1_1501480455281_5298">Technical Co-Sponsorship:<br id="yui_3_16_0_ym19_1_1501480455281_5299">Springer Lecture Notes in Computer Science (LNCS)<br id="yui_3_16_0_ym19_1_1501480455281_5300"><br id="yui_3_16_0_ym19_1_1501480455281_5301">Venue & Dates:<br id="yui_3_16_0_ym19_1_1501480455281_5302">Guangzhou, China, December 12-15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5303"><br id="yui_3_16_0_ym19_1_1501480455281_5304">http://trust.gzhu.edu.cn/conference/SpaCCS2017/<br id="yui_3_16_0_ym19_1_1501480455281_5305"><br id="yui_3_16_0_ym19_1_1501480455281_5306">Co-Located Conferences:<br id="yui_3_16_0_ym19_1_1501480455281_5307">(1) The 15th IEEE International Symposium on Parallel and Distributed Processing with Applications <br id="yui_3_16_0_ym19_1_1501480455281_5308">(IEEE ISPA 2017), Guangzhou, China, December 12-15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5309"><br id="yui_3_16_0_ym19_1_1501480455281_5310">***One of Class "C" Conferences ranked by China Computer Federation (CCF)***<br id="yui_3_16_0_ym19_1_1501480455281_5311"><br id="yui_3_16_0_ym19_1_1501480455281_5312">http://trust.gzhu.edu.cn/conference/ISPA2017/<br id="yui_3_16_0_ym19_1_1501480455281_5313"><br id="yui_3_16_0_ym19_1_1501480455281_5314">(2) The 16th IEEE International Conference on Ubiquitous Computing and Communications <br id="yui_3_16_0_ym19_1_1501480455281_5315">(IEEE IUCC 2017), Guangzhou, China, December 12-15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5316"><br id="yui_3_16_0_ym19_1_1501480455281_5317">http://trust.gzhu.edu.cn/conference/IUCC2017/<br id="yui_3_16_0_ym19_1_1501480455281_5318"><br id="yui_3_16_0_ym19_1_1501480455281_5319">------------------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5320">Keynote Speeches Section<br id="yui_3_16_0_ym19_1_1501480455281_5321"><br id="yui_3_16_0_ym19_1_1501480455281_5322">You are welcome to attend 11+ Keynote Speeches Shared by Co-Located SpaCCS 2017 & IEEE ISPA 2017 & IEEE IUCC 2017 Conferences:<br id="yui_3_16_0_ym19_1_1501480455281_5323"><br id="yui_3_16_0_ym19_1_1501480455281_5324">http://trust.gzhu.edu.cn/conference/SpaCCS2017/KeynoteSpeeches.htm<br id="yui_3_16_0_ym19_1_1501480455281_5325"><br id="yui_3_16_0_ym19_1_1501480455281_5326">Keynote Speaker 1: Prof. Geoffrey Fox, Indiana University, USA (Fellow of APS (Physics) and Fellow of ACM (Computing))<br id="yui_3_16_0_ym19_1_1501480455281_5327">https://www.soic.indiana.edu/all-people/profile.html?profile_id=203<br id="yui_3_16_0_ym19_1_1501480455281_5328">Title: Next Generation Grid: Integrating Parallel and Distributed Computing Runtimes from Cloud to Edge Applications<br id="yui_3_16_0_ym19_1_1501480455281_5329"><br id="yui_3_16_0_ym19_1_1501480455281_5330">Keynote Speaker 2: Prof. Lajos Hanzo, University of Southampton, UK (Fellow of the Royal Academy of Engineering of UK, Fellow of the IEEE, Fellow of the IEE/IET)<br id="yui_3_16_0_ym19_1_1501480455281_5331">http://www-mobile.ecs.soton.ac.uk/newcomms/?q=people/lh<br id="yui_3_16_0_ym19_1_1501480455281_5332">Title: Quantum-Search Algorithms, Quantum Codes and All That...<br id="yui_3_16_0_ym19_1_1501480455281_5333"><br id="yui_3_16_0_ym19_1_1501480455281_5334">Keynote Speaker 3: Prof. Azzedine Boukerche, University of Ottawa, Canada (Fellow of the IEEE, Fellow of the Canadian Academy of Engineering, Fellow of the Engineering Institute of Canada, Fellow of the American Association for the Advancement of Science)<br id="yui_3_16_0_ym19_1_1501480455281_5335">http://www.site.uottawa.ca/~boukerch/<br id="yui_3_16_0_ym19_1_1501480455281_5336">Title: Autonomous and Connected Vehicles: A New Challenge for Smart Cities<br id="yui_3_16_0_ym19_1_1501480455281_5337"><br id="yui_3_16_0_ym19_1_1501480455281_5338">Keynote Speaker 4: Prof. Jie Wu, Temple University, USA (IEEE Fellow)<br id="yui_3_16_0_ym19_1_1501480455281_5339">https://cis.temple.edu/~wu/<br id="yui_3_16_0_ym19_1_1501480455281_5340">Title: Optimizing MapReduce Framework through Joint Scheduling of Overlapping Phases<br id="yui_3_16_0_ym19_1_1501480455281_5341"><br id="yui_3_16_0_ym19_1_1501480455281_5342">Keynote Speaker 5: Prof. Robert Deng, Singapore Management University, Singapore (IEEE Fellow)<br id="yui_3_16_0_ym19_1_1501480455281_5343">http://www.mysmu.edu/faculty/robertdeng/<br id="yui_3_16_0_ym19_1_1501480455281_5344">Title: Privacy-Preserving Access Control and Computations of Encrypted Data in the Cloud<br id="yui_3_16_0_ym19_1_1501480455281_5345"><br id="yui_3_16_0_ym19_1_1501480455281_5346">Keynote Speaker 6: Prof. Ljiljana Trajkovic, Simon Fraser University, Canada (IEEE Fellow)<br id="yui_3_16_0_ym19_1_1501480455281_5347">http://www.ensc.sfu.ca/~ljilja<br id="yui_3_16_0_ym19_1_1501480455281_5348">Title: Data Mining and Machine Learning for Analysis of Network Traffic<br id="yui_3_16_0_ym19_1_1501480455281_5349"><br id="yui_3_16_0_ym19_1_1501480455281_5350">Keynote Speaker 7: Professor Kin K. Leung, Imperial College London, UK (IEEE Fellow)<br id="yui_3_16_0_ym19_1_1501480455281_5351">http://www.commsp.ee.ic.ac.uk/~kkleung/<br id="yui_3_16_0_ym19_1_1501480455281_5352">Title: TBD.<br id="yui_3_16_0_ym19_1_1501480455281_5353"><br id="yui_3_16_0_ym19_1_1501480455281_5354">Keynote Speaker 8: Prof. Vijay Varadharajan, The University of Newcastle, Australia (FIEE, FBCS, FACS, FIEAust, FIMA)<br id="yui_3_16_0_ym19_1_1501480455281_5355">https://www.newcastle.edu.au/profile/vijay-varadharajan<br id="yui_3_16_0_ym19_1_1501480455281_5356">Title: Security Challenges in Software Defined Networks Policy based Security Architecture for Software Defined Networks<br id="yui_3_16_0_ym19_1_1501480455281_5357"><br id="yui_3_16_0_ym19_1_1501480455281_5358">Keynote Speaker 9: Prof. Hai Jin, Huazhong University of Science and Technology, China (Cheung Kung Scholars Chair Professor, Fellow of the CCF)<br id="yui_3_16_0_ym19_1_1501480455281_5359">http://www.linkedin.com/in/jinhust<br id="yui_3_16_0_ym19_1_1501480455281_5360">Title: Towards Dataflow-based Graph Accelerator<br id="yui_3_16_0_ym19_1_1501480455281_5361"><br id="yui_3_16_0_ym19_1_1501480455281_5362">Keynote Speaker 10: Prof. Jianhua Ma, Hosei University, Japan<br id="yui_3_16_0_ym19_1_1501480455281_5363">http://cis.k.hosei.ac.jp/~jianhua/mahome/<br id="yui_3_16_0_ym19_1_1501480455281_5364">Title: TBD.<br id="yui_3_16_0_ym19_1_1501480455281_5365"><br id="yui_3_16_0_ym19_1_1501480455281_5366">Keynote Speaker 11: Prof. Jinjun Chen, Swinburne University of Technology, Australia<br id="yui_3_16_0_ym19_1_1501480455281_5367">http://www.swinflow.org/~jchen/<br id="yui_3_16_0_ym19_1_1501480455281_5368">Title: Big Data - Big Application<br id="yui_3_16_0_ym19_1_1501480455281_5369"><br id="yui_3_16_0_ym19_1_1501480455281_5370">* More keynote speakers will be added later.<br id="yui_3_16_0_ym19_1_1501480455281_5371"><br id="yui_3_16_0_ym19_1_1501480455281_5372">------------------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5373">Special Issues Section<br id="yui_3_16_0_ym19_1_1501480455281_5374"><br id="yui_3_16_0_ym19_1_1501480455281_5375">Distinguished papers, after further revisions, will be published in 14+ SCI & EI indexed special issues (confirmed): <br id="yui_3_16_0_ym19_1_1501480455281_5376"><br id="yui_3_16_0_ym19_1_1501480455281_5377">(1) IEEE Transactions on Industrial Informatics (SCI&EI Indexed, Impact Factor: 4.79)<br id="yui_3_16_0_ym19_1_1501480455281_5378">http://tii.ieee-ies.org/<br id="yui_3_16_0_ym19_1_1501480455281_5379"><br id="yui_3_16_0_ym19_1_1501480455281_5380">(2) IEEE Transactions on Emerging Topics in Computing (SCI&EI Indexed, Impact Factor: to appear soon)<br id="yui_3_16_0_ym19_1_1501480455281_5381">https://www.computer.org/web/tetc<br id="yui_3_16_0_ym19_1_1501480455281_5382"><br id="yui_3_16_0_ym19_1_1501480455281_5383">(3) IEEE Access (SCI&EI Indexed, Impact Factor: 1.270)<br id="yui_3_16_0_ym19_1_1501480455281_5384">http://ieeeaccess.ieee.org/<br id="yui_3_16_0_ym19_1_1501480455281_5385"><br id="yui_3_16_0_ym19_1_1501480455281_5386">(4) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 3.364)<br id="yui_3_16_0_ym19_1_1501480455281_5387">http://www.journals.elsevier.com/information-sciences/<br id="yui_3_16_0_ym19_1_1501480455281_5388"><br id="yui_3_16_0_ym19_1_1501480455281_5389">(5) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact Factor: 2.430)<br id="yui_3_16_0_ym19_1_1501480455281_5390">http://www.journals.elsevier.com/future-generation-computer-systems/<br id="yui_3_16_0_ym19_1_1501480455281_5391"><br id="yui_3_16_0_ym19_1_1501480455281_5392">(6) Cluster Computing - Springer (SCI&EI Indexed, Impact Factor: 1.514)<br id="yui_3_16_0_ym19_1_1501480455281_5393">http://link.springer.com/journal/10586<br id="yui_3_16_0_ym19_1_1501480455281_5394"><br id="yui_3_16_0_ym19_1_1501480455281_5395">(7) Multimedia Tools and Applications - Springer (SCI&EI Indexed, Impact Factor: 1.331)<br id="yui_3_16_0_ym19_1_1501480455281_5396">https://link.springer.com/journal/11042<br id="yui_3_16_0_ym19_1_1501480455281_5397"><br id="yui_3_16_0_ym19_1_1501480455281_5398">(8) Journal of Parallel and Distributed Computing - Elsevier (SCI&EI Indexed, Impact Factor: 1.320)<br id="yui_3_16_0_ym19_1_1501480455281_5399">http://www.journals.elsevier.com/journal-of-parallel-and-distributed-computing/<br id="yui_3_16_0_ym19_1_1501480455281_5400"><br id="yui_3_16_0_ym19_1_1501480455281_5401">(9) Concurrency and Computation: Practice and Experience - Wiley (SCI&EI Indexed, Impact Factor: 0.94)<br id="yui_3_16_0_ym19_1_1501480455281_5402">http://www.cc-pe.net/journalinfo/<br id="yui_3_16_0_ym19_1_1501480455281_5403"><br id="yui_3_16_0_ym19_1_1501480455281_5404">(10) Security and Communication Networks - Hindawi (SCI&EI Indexed, Impact Factor: 0.806)<br id="yui_3_16_0_ym19_1_1501480455281_5405">https://www.hindawi.com/journals/scn/<br id="yui_3_16_0_ym19_1_1501480455281_5406"><br id="yui_3_16_0_ym19_1_1501480455281_5407">(11) Future Internet - MDPI (ESCI & EI Indexed)<br id="yui_3_16_0_ym19_1_1501480455281_5408">http://www.mdpi.com/journal/futureinternet<br id="yui_3_16_0_ym19_1_1501480455281_5409"><br id="yui_3_16_0_ym19_1_1501480455281_5410">(12) International Journal of Computational Science and Engineering (IJCSE) - INDERSCIENCE (ESCI & EI Indexed)<br id="yui_3_16_0_ym19_1_1501480455281_5411">http://www.inderscience.com/jhome.php?jcode=IJCSE<br id="yui_3_16_0_ym19_1_1501480455281_5412"><br id="yui_3_16_0_ym19_1_1501480455281_5413">(13) International Journal of Embedded Systems (IJES) - INDERSCIENCE (EI Indexed)<br id="yui_3_16_0_ym19_1_1501480455281_5414">http://www.inderscience.com/jhome.php?jcode=IJES<br id="yui_3_16_0_ym19_1_1501480455281_5415"><br id="yui_3_16_0_ym19_1_1501480455281_5416">(14) International Journal of High Performance Computing and Networking (IJHPCN) - INDERSCIENCE (EI Indexed)<br id="yui_3_16_0_ym19_1_1501480455281_5417">http://www.inderscience.com/jhome.php?jcode=ijhpcn<br id="yui_3_16_0_ym19_1_1501480455281_5418"><br id="yui_3_16_0_ym19_1_1501480455281_5419">* More special issues will be added later. <br id="yui_3_16_0_ym19_1_1501480455281_5420"><br id="yui_3_16_0_ym19_1_1501480455281_5421">------------------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5422">Introduction<br id="yui_3_16_0_ym19_1_1501480455281_5423"><br id="yui_3_16_0_ym19_1_1501480455281_5424">The SpaCCS 2017 conference is the 10th event in the series of conferences which are devoted to security, privacy and anonymity in computation, communication and storage. SpaCCS is now recognized as the main regular event of the world that is covering many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. As applications of computer systems and networks have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The conference will provide a forum for the world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.<br id="yui_3_16_0_ym19_1_1501480455281_5425"><br id="yui_3_16_0_ym19_1_1501480455281_5426">Following the traditions of previous successful SpaCCS conferences, held in Zhangjiajie, China (2016), Helsinki, Finland (2015), Beijing, China (2014), Melbourne, Australia (2013), Liverpool, UK (2012), and Changsha, China (2011), the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2017) will be held in Guangzhou, China, December 12-15, 2017. The conference aims at bringing together researchers and practitioners in the world working in the research fields of computation, communication and storage, with regard to security, privacy, and anonymity aspects of computer systems and networks. SpaCCS 2017 will focus on three broad areas of computation, communication, and storage, i.e. architectures, algorithms, techniques, and applications for security, privacy and anonymity.<br id="yui_3_16_0_ym19_1_1501480455281_5427"><br id="yui_3_16_0_ym19_1_1501480455281_5428">Scope and Interests<br id="yui_3_16_0_ym19_1_1501480455281_5429"><br id="yui_3_16_0_ym19_1_1501480455281_5430">Track 1: Security<br id="yui_3_16_0_ym19_1_1501480455281_5431"><br id="yui_3_16_0_ym19_1_1501480455281_5432">1.1 Computation<br id="yui_3_16_0_ym19_1_1501480455281_5433"> (1) Security Model and Architecture<br id="yui_3_16_0_ym19_1_1501480455281_5434"> (2) Software and System Security<br id="yui_3_16_0_ym19_1_1501480455281_5435"> (3) Secure Computing Platform<br id="yui_3_16_0_ym19_1_1501480455281_5436"> (4) Secure Network Computing<br id="yui_3_16_0_ym19_1_1501480455281_5437"> (5) Security in Cloud Computing and Pervasive/Ubiquitous Computing<br id="yui_3_16_0_ym19_1_1501480455281_5438"> (6) Risk Analysis and Management<br id="yui_3_16_0_ym19_1_1501480455281_5439"><br id="yui_3_16_0_ym19_1_1501480455281_5440">1.2 Communication<br id="yui_3_16_0_ym19_1_1501480455281_5441"> (1) Network Security<br id="yui_3_16_0_ym19_1_1501480455281_5442"> (2) Malware and Botnets<br id="yui_3_16_0_ym19_1_1501480455281_5443"> (3) Intrusion Detection<br id="yui_3_16_0_ym19_1_1501480455281_5444"> (4) Security in Web Services<br id="yui_3_16_0_ym19_1_1501480455281_5445"> (5) Security in Mobile Social Networks<br id="yui_3_16_0_ym19_1_1501480455281_5446"> (6) Security in Mobile and Wireless Communications<br id="yui_3_16_0_ym19_1_1501480455281_5447"> (7) Fraud and Cyber-Crime<br id="yui_3_16_0_ym19_1_1501480455281_5448"><br id="yui_3_16_0_ym19_1_1501480455281_5449">1.3 Storage<br id="yui_3_16_0_ym19_1_1501480455281_5450"> (1) Access Control<br id="yui_3_16_0_ym19_1_1501480455281_5451"> (2) Applied Cryptography<br id="yui_3_16_0_ym19_1_1501480455281_5452"> (3) Database Security<br id="yui_3_16_0_ym19_1_1501480455281_5453"> (4) Data Protection and Data Integrity<br id="yui_3_16_0_ym19_1_1501480455281_5454"> (5) Digital Content Protection and Digital Forensics<br id="yui_3_16_0_ym19_1_1501480455281_5455"> (6) Information Hiding<br id="yui_3_16_0_ym19_1_1501480455281_5456"> (7) Security in Big Data and its Applications<br id="yui_3_16_0_ym19_1_1501480455281_5457"><br id="yui_3_16_0_ym19_1_1501480455281_5458">Track 2: Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5459"><br id="yui_3_16_0_ym19_1_1501480455281_5460">2.1 Computation<br id="yui_3_16_0_ym19_1_1501480455281_5461"> (1) Measuring and Quantifying Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5462"> (2) Privacy Modelling and Analysis<br id="yui_3_16_0_ym19_1_1501480455281_5463"> (3) Software and System Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5464"> (4) Privacy-preserving Computing Platform<br id="yui_3_16_0_ym19_1_1501480455281_5465"> (5) Privacy-enhanced Network Computing<br id="yui_3_16_0_ym19_1_1501480455281_5466"> (6) Obfuscation-based Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5467"> (7) Cryptographic Tools for Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5468"> (8) Building and Deploying Privacy-enhancing Systems<br id="yui_3_16_0_ym19_1_1501480455281_5469"> (9) Reliability, Robustness, and Abuse Prevention in Privacy Systems<br id="yui_3_16_0_ym19_1_1501480455281_5470"><br id="yui_3_16_0_ym19_1_1501480455281_5471">2.2 Communication<br id="yui_3_16_0_ym19_1_1501480455281_5472"> (1) Privacy in Web Services<br id="yui_3_16_0_ym19_1_1501480455281_5473"> (2) Privacy Metrics and Policies<br id="yui_3_16_0_ym19_1_1501480455281_5474"> (3) Crowdsourcing for Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5475"> (4) Location and Mobility Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5476"> (5) Privacy in Cloud and Big Data Applications<br id="yui_3_16_0_ym19_1_1501480455281_5477"> (6) Privacy in Ubiquitous Computing and Mobile Devices<br id="yui_3_16_0_ym19_1_1501480455281_5478"> (7) Privacy in Social Networks and Microblogging Systems<br id="yui_3_16_0_ym19_1_1501480455281_5479"> (8) Privacy-enhanced Access Control, Authentication, and Identity Management<br id="yui_3_16_0_ym19_1_1501480455281_5480"><br id="yui_3_16_0_ym19_1_1501480455281_5481">2.3 Storage<br id="yui_3_16_0_ym19_1_1501480455281_5482"> (1) Data Protection Technologies<br id="yui_3_16_0_ym19_1_1501480455281_5483"> (2) Differential Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5484"> (3) Privacy in Big Data and its Applications<br id="yui_3_16_0_ym19_1_1501480455281_5485"> (4) Policy Languages and Tools for Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5486"> (5) Privacy and Human Rights<br id="yui_3_16_0_ym19_1_1501480455281_5487"> (6) Interdisciplinary Research Connecting Privacy to Other Fields<br id="yui_3_16_0_ym19_1_1501480455281_5488"> (7) Privacy in Cloud Computing and Pervasive/Ubiquitous Computing<br id="yui_3_16_0_ym19_1_1501480455281_5489"> (8) Information Leakage, Data Correlation and Generic Attacks to Privacy<br id="yui_3_16_0_ym19_1_1501480455281_5490"> (9) Privacy-Preserving Data Mining, Data Release and Publishing<br id="yui_3_16_0_ym19_1_1501480455281_5491"><br id="yui_3_16_0_ym19_1_1501480455281_5492">Track 3: Anonymity<br id="yui_3_16_0_ym19_1_1501480455281_5493"><br id="yui_3_16_0_ym19_1_1501480455281_5494">3.1 Computation<br id="yui_3_16_0_ym19_1_1501480455281_5495"> (1) Anonymous Data Mining and Data Sharing<br id="yui_3_16_0_ym19_1_1501480455281_5496"> (2) Parallelism Exploitation Techniques for Anonymity<br id="yui_3_16_0_ym19_1_1501480455281_5497"> (3) Anonymity in Big Data Analytics<br id="yui_3_16_0_ym19_1_1501480455281_5498"> (4) Anonymous Management in Trust Relationships<br id="yui_3_16_0_ym19_1_1501480455281_5499"> (5) Anonymous Video Analytics Technology<br id="yui_3_16_0_ym19_1_1501480455281_5500"> (6) Anonymity Metrics, Measures and Evaluations<br id="yui_3_16_0_ym19_1_1501480455281_5501"> (7) Anonymity Models, Hardware/Device of Anonymity<br id="yui_3_16_0_ym19_1_1501480455281_5502"><br id="yui_3_16_0_ym19_1_1501480455281_5503">3.2 Communication<br id="yui_3_16_0_ym19_1_1501480455281_5504"> (1) Anonymity in Wireless Communication Systems<br id="yui_3_16_0_ym19_1_1501480455281_5505"> (2) Anonymous Communication Protocols<br id="yui_3_16_0_ym19_1_1501480455281_5506"> (3) Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks<br id="yui_3_16_0_ym19_1_1501480455281_5507"> (4) Anonymous Proxy Software<br id="yui_3_16_0_ym19_1_1501480455281_5508"> (5) Anonymous Communication and Internet<br id="yui_3_16_0_ym19_1_1501480455281_5509"> (6) Anonymous Social Networks, Structural k-Anonymity in Social Networks<br id="yui_3_16_0_ym19_1_1501480455281_5510"> (7) Authentication Protocol Providing User Anonymity<br id="yui_3_16_0_ym19_1_1501480455281_5511"><br id="yui_3_16_0_ym19_1_1501480455281_5512">3.3 Storage<br id="yui_3_16_0_ym19_1_1501480455281_5513"> (1) Distributed Anonymous Information Storage and Management<br id="yui_3_16_0_ym19_1_1501480455281_5514"> (2) Private and Anonymous Data Storage<br id="yui_3_16_0_ym19_1_1501480455281_5515"> (3) Anonymity-Preserving Data Collection and Database<br id="yui_3_16_0_ym19_1_1501480455281_5516"> (4) Anonymity, Pseudonymity & Identity Management<br id="yui_3_16_0_ym19_1_1501480455281_5517"> (5) Anonymity in Big Data and Cloud Scenarios<br id="yui_3_16_0_ym19_1_1501480455281_5518"> (6) Anonymity in Health and Medical Databases<br id="yui_3_16_0_ym19_1_1501480455281_5519"><br id="yui_3_16_0_ym19_1_1501480455281_5520"> <br id="yui_3_16_0_ym19_1_1501480455281_5521">Submission and Publication Information<br id="yui_3_16_0_ym19_1_1501480455281_5522"><br id="yui_3_16_0_ym19_1_1501480455281_5523">All papers need to be submitted electronically through the conference website (https://easychair.org/conferences/?conf=spaccs2017) with PDF format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 14 pages in Springer LNCS format (http://www.springer.com/cn/computer-science/lncs/conference-proceedings-guidelines) (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. SpaCCS 2017 reserves the right to exclude a paper from distribution after the conference (e.g., removal from the digital library and indexing services), if the paper is not presented at the conference. All accepted papers will be published by Springer LNCS (EI Indexed). Two outstanding papers will be selected to receive the Best Paper Awards.<br id="yui_3_16_0_ym19_1_1501480455281_5524"><br id="yui_3_16_0_ym19_1_1501480455281_5525">Important Dates<br id="yui_3_16_0_ym19_1_1501480455281_5526"><br id="yui_3_16_0_ym19_1_1501480455281_5527">Paper Submission Deadline: August 15, 2017 (Extended)<br id="yui_3_16_0_ym19_1_1501480455281_5528">Author Notification: September 15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5529">Camera-Ready Paper Due: October 15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5530">Conference Dates: December 12-15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5531"><br id="yui_3_16_0_ym19_1_1501480455281_5532"><br id="yui_3_16_0_ym19_1_1501480455281_5533">General Chairs<br id="yui_3_16_0_ym19_1_1501480455281_5534"><br id="yui_3_16_0_ym19_1_1501480455281_5535">Robert Deng, Singapore Management University, Singapore<br id="yui_3_16_0_ym19_1_1501480455281_5536">Yang Xiang, Deakin University, Australia<br id="yui_3_16_0_ym19_1_1501480455281_5537">Jose M. Alcaraz Calero, University of the West of Scotland, UK <br id="yui_3_16_0_ym19_1_1501480455281_5538"><br id="yui_3_16_0_ym19_1_1501480455281_5539">Program Chairs<br id="yui_3_16_0_ym19_1_1501480455281_5540"><br id="yui_3_16_0_ym19_1_1501480455281_5541">Mohammed Atiquzzaman, University of Oklahoma, USA<br id="yui_3_16_0_ym19_1_1501480455281_5542">Zheng Yan, Aalto University, Finland<br id="yui_3_16_0_ym19_1_1501480455281_5543">Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA<br id="yui_3_16_0_ym19_1_1501480455281_5544"><br id="yui_3_16_0_ym19_1_1501480455281_5545">Program Vice Chairs<br id="yui_3_16_0_ym19_1_1501480455281_5546"><br id="yui_3_16_0_ym19_1_1501480455281_5547">(1) Security Track<br id="yui_3_16_0_ym19_1_1501480455281_5548">Christian Esposito, University of Salerno, Italy<br id="yui_3_16_0_ym19_1_1501480455281_5549">Jin Li, Guangzhou University, China<br id="yui_3_16_0_ym19_1_1501480455281_5550"><br id="yui_3_16_0_ym19_1_1501480455281_5551">(2) Privacy Track<br id="yui_3_16_0_ym19_1_1501480455281_5552">Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy<br id="yui_3_16_0_ym19_1_1501480455281_5553">Zeeshan Pervez, University of the West of Scotland, UK<br id="yui_3_16_0_ym19_1_1501480455281_5554"><br id="yui_3_16_0_ym19_1_1501480455281_5555">(3) Anonymity Track<br id="yui_3_16_0_ym19_1_1501480455281_5556">Sabu M. Thampi, Indian Institute of Information Technology and Management, India<br id="yui_3_16_0_ym19_1_1501480455281_5557">Wenjun Jiang, Hunan University, China<br id="yui_3_16_0_ym19_1_1501480455281_5558"><br id="yui_3_16_0_ym19_1_1501480455281_5559">Program Committee Members<br id="yui_3_16_0_ym19_1_1501480455281_5560"><br id="yui_3_16_0_ym19_1_1501480455281_5561">Please check the conference website for detail.<br id="yui_3_16_0_ym19_1_1501480455281_5562"> <br id="yui_3_16_0_ym19_1_1501480455281_5563">Steering Committee<br id="yui_3_16_0_ym19_1_1501480455281_5564"><br id="yui_3_16_0_ym19_1_1501480455281_5565">Guojun Wang, Guangzhou University, China (Chair)<br id="yui_3_16_0_ym19_1_1501480455281_5566">Gregorio Martinez, University of Murcia, Spain (Chair)<br id="yui_3_16_0_ym19_1_1501480455281_5567">Jemal H. Abawajy, Deakin University, Australia<br id="yui_3_16_0_ym19_1_1501480455281_5568">Jose M. Alcaraz Calero, University of the West of Scotland, UK<br id="yui_3_16_0_ym19_1_1501480455281_5569">Jiannong Cao, Hong Kong Polytechnic University, Hong Kong<br id="yui_3_16_0_ym19_1_1501480455281_5570">Hsiao-Hwa Chen, National Cheng Kung University, Taiwan<br id="yui_3_16_0_ym19_1_1501480455281_5571">Jinjun Chen, University of Technology, Sydney, Australia<br id="yui_3_16_0_ym19_1_1501480455281_5572">Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA<br id="yui_3_16_0_ym19_1_1501480455281_5573">Robert Deng, Singapore Management University, Singapore<br id="yui_3_16_0_ym19_1_1501480455281_5574">Mario Freire, The University of Beira Interior, Portuga<br id="yui_3_16_0_ym19_1_1501480455281_5575">Minyi Guo, Shanghai Jiao Tong University, China<br id="yui_3_16_0_ym19_1_1501480455281_5576">Weijia Jia, Shanghai Jiao Tong University, China<br id="yui_3_16_0_ym19_1_1501480455281_5577">Wei Jie, University of West London, UK<br id="yui_3_16_0_ym19_1_1501480455281_5578">Georgios Kambourakis, University of the Aegean, Greece<br id="yui_3_16_0_ym19_1_1501480455281_5579">Ryan Ko, University of Waikato, New Zealand<br id="yui_3_16_0_ym19_1_1501480455281_5580">Constantinos Kolias, George Mason University, USA<br id="yui_3_16_0_ym19_1_1501480455281_5581">Jianbin Li, Central South University, China<br id="yui_3_16_0_ym19_1_1501480455281_5582">Jie Li, University of Tsukuba, Japan<br id="yui_3_16_0_ym19_1_1501480455281_5583">Jianhua Ma, Hosei University, Japan<br id="yui_3_16_0_ym19_1_1501480455281_5584">Felix Gomez Marmol, University of Murcia, Spain<br id="yui_3_16_0_ym19_1_1501480455281_5585">Geyong Min, University of Exeter, UK<br id="yui_3_16_0_ym19_1_1501480455281_5586">Peter Mueller, IBM Zurich Research Laboratory, Switzerland<br id="yui_3_16_0_ym19_1_1501480455281_5587">Indrakshi Ray, Colorado State University, USA<br id="yui_3_16_0_ym19_1_1501480455281_5588">Kouichi Sakurai, Kyushu University, Japan<br id="yui_3_16_0_ym19_1_1501480455281_5589">Juan E. Tapiador, The University Carlos III of Madrid, Spain<br id="yui_3_16_0_ym19_1_1501480455281_5590">Sabu M. Thampi, Indian Institute of Information Technology and Management, India<br id="yui_3_16_0_ym19_1_1501480455281_5591">Jie Wu, Temple University, USA<br id="yui_3_16_0_ym19_1_1501480455281_5592">Yang Xiao, The University of Alabama, USA<br id="yui_3_16_0_ym19_1_1501480455281_5593">Yang Xiang, Deakin University, Australia<br id="yui_3_16_0_ym19_1_1501480455281_5594">Zheng Yan, Aalto University, Finland<br id="yui_3_16_0_ym19_1_1501480455281_5595">Laurence T. Yang, St. Francis Xavier University, Canada<br id="yui_3_16_0_ym19_1_1501480455281_5596">Wanlei Zhou, Deakin University, Australia<br id="yui_3_16_0_ym19_1_1501480455281_5597"><br id="yui_3_16_0_ym19_1_1501480455281_5598">Workshop Chairs<br id="yui_3_16_0_ym19_1_1501480455281_5599"><br id="yui_3_16_0_ym19_1_1501480455281_5600">Georgios Kambourakis, University of the Aegean, Samos, Greece<br id="yui_3_16_0_ym19_1_1501480455281_5601">Ryan Ko, University of Waikato, New Zealand<br id="yui_3_16_0_ym19_1_1501480455281_5602">Sancheng Peng, Guangdong University of Foreign Studies, China<br id="yui_3_16_0_ym19_1_1501480455281_5603"><br id="yui_3_16_0_ym19_1_1501480455281_5604">Publicity Chairs<br id="yui_3_16_0_ym19_1_1501480455281_5605"><br id="yui_3_16_0_ym19_1_1501480455281_5606">Carlos Becker Westphall, Federal University of Santa Catarina, Brazil<br id="yui_3_16_0_ym19_1_1501480455281_5607">Scott Fowler, Linkoping University, Sweden<br id="yui_3_16_0_ym19_1_1501480455281_5608">Mir Sajjad Hussain Talpur, Sindh Agriculture University, Pakistan<br id="yui_3_16_0_ym19_1_1501480455281_5609"><br id="yui_3_16_0_ym19_1_1501480455281_5610">Publication Chair<br id="yui_3_16_0_ym19_1_1501480455281_5611"><br id="yui_3_16_0_ym19_1_1501480455281_5612">Fang Qi, Central South University, China<br id="yui_3_16_0_ym19_1_1501480455281_5613"><br id="yui_3_16_0_ym19_1_1501480455281_5614">Registration Chair<br id="yui_3_16_0_ym19_1_1501480455281_5615"><br id="yui_3_16_0_ym19_1_1501480455281_5616">Pin Liu, Central South University, China<br id="yui_3_16_0_ym19_1_1501480455281_5617"><br id="yui_3_16_0_ym19_1_1501480455281_5618">Organizing Chairs<br id="yui_3_16_0_ym19_1_1501480455281_5619"><br id="yui_3_16_0_ym19_1_1501480455281_5620">Dongqing Xie, Guangzhou University, China<br id="yui_3_16_0_ym19_1_1501480455281_5621">Shuhong Chen, Guangzhou University, China<br id="yui_3_16_0_ym19_1_1501480455281_5622">Xiaofei Xing, Guangzhou University, China<br id="yui_3_16_0_ym19_1_1501480455281_5623"><br id="yui_3_16_0_ym19_1_1501480455281_5624">Webmaster<br id="yui_3_16_0_ym19_1_1501480455281_5625"><br id="yui_3_16_0_ym19_1_1501480455281_5626">Yang Shu, Central South University, China<br id="yui_3_16_0_ym19_1_1501480455281_5627"><br id="yui_3_16_0_ym19_1_1501480455281_5628">-------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5629">Part II: Call for Workshop Papers, SpaCCS 2017, Guangzhou, China, December 12-15, 2017<br id="yui_3_16_0_ym19_1_1501480455281_5630">-------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5631">You are also welcome to submit papers to 12 Symposiums/Workshops in conjunction with SpaCCS 2017<br id="yui_3_16_0_ym19_1_1501480455281_5632">(1) The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5633">http://trust.gzhu.edu.cn/conference/UbiSafe2017/<br id="yui_3_16_0_ym19_1_1501480455281_5634"><br id="yui_3_16_0_ym19_1_1501480455281_5635">(2) The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5636">http://trust.gzhu.edu.cn/conference/ISSR2017/<br id="yui_3_16_0_ym19_1_1501480455281_5637"><br id="yui_3_16_0_ym19_1_1501480455281_5638">(3) The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5639">http://trust.gzhu.edu.cn/conference/TrustData2017/<br id="yui_3_16_0_ym19_1_1501480455281_5640"><br id="yui_3_16_0_ym19_1_1501480455281_5641">(4) The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5642">http://trust.gzhu.edu.cn/conference/TSP2017/<br id="yui_3_16_0_ym19_1_1501480455281_5643"><br id="yui_3_16_0_ym19_1_1501480455281_5644">(5) The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5645">http://trust.gzhu.edu.cn/conference/SPIoT2017/<br id="yui_3_16_0_ym19_1_1501480455281_5646"><br id="yui_3_16_0_ym19_1_1501480455281_5647">(6) The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5648">http://trust.gzhu.edu.cn/conference/NOPE2017/<br id="yui_3_16_0_ym19_1_1501480455281_5649"><br id="yui_3_16_0_ym19_1_1501480455281_5650">(7) The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5651">http://trust.gzhu.edu.cn/conference/DependSys2017/<br id="yui_3_16_0_ym19_1_1501480455281_5652"><br id="yui_3_16_0_ym19_1_1501480455281_5653">(8) The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5654">http://trust.gzhu.edu.cn/conference/SCS2017/<br id="yui_3_16_0_ym19_1_1501480455281_5655"><br id="yui_3_16_0_ym19_1_1501480455281_5656">(9) The 2nd Annual Big Data Security, Privacy and Trust Workshop (BigDataSPT 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5657">http://trust.gzhu.edu.cn/conference/BigDataSPT2017/<br id="yui_3_16_0_ym19_1_1501480455281_5658"><br id="yui_3_16_0_ym19_1_1501480455281_5659">(10) The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017) <br id="yui_3_16_0_ym19_1_1501480455281_5660">http://trust.gzhu.edu.cn/conference/WCSSC2017/<br id="yui_3_16_0_ym19_1_1501480455281_5661"><br id="yui_3_16_0_ym19_1_1501480455281_5662">(11) The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5663">http://trust.gzhu.edu.cn/conference/MSDF2017/<br id="yui_3_16_0_ym19_1_1501480455281_5664"><br id="yui_3_16_0_ym19_1_1501480455281_5665">(12) The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (BDSP 2017)<br id="yui_3_16_0_ym19_1_1501480455281_5666">https://spbd2017.yolasite.com/<br id="yui_3_16_0_ym19_1_1501480455281_5667">-------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5668"><br id="yui_3_16_0_ym19_1_1501480455281_5669">Contact<br id="yui_3_16_0_ym19_1_1501480455281_5670"><br id="yui_3_16_0_ym19_1_1501480455281_5671">Please email inquiries concerning SpaCCS 2017 to:<br id="yui_3_16_0_ym19_1_1501480455281_5672">Prof. Guojun Wang: csgjwang AT gmail DOT com and the conference organizers (SpaCCS2017 AT gmail DOT com).<br id="yui_3_16_0_ym19_1_1501480455281_5673">Prof. Guojun Wang's Homepage: http://trust.gzhu.edu.cn/faculty/~csgjwang/ <br id="yui_3_16_0_ym19_1_1501480455281_5674"><br id="yui_3_16_0_ym19_1_1501480455281_5675">Copyright AT Institute of Computer Networks, Guangzhou University, Guangzhou, China <br id="yui_3_16_0_ym19_1_1501480455281_5676">-------------------------------------------------------------------------------------------------<br id="yui_3_16_0_ym19_1_1501480455281_5677"><br></div></div></body></html>