First International Conference on Cryptography and Security 2017

 


Scope

The purpose of ICCS 2017, the International Conference on Cryptography and Security, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication.

Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, ICCS also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.

Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics.

To provide opportunities for the different research area delegates to exchange new ideas and application experiences face to face, to establish business / research relations to find global partners for future collaboration in the areas of Intelligent Computing and Systems. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of ICCS 2017, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and virtual sessions.

The papers will be made to appear in a book to be published by ASDF HQ, India in EDLIB (www.edlib.net). All the published paper will be indexed by Google Scholar and various others search engines.

ALL THE PAPERS SUBMITTED ARE DOUBLE PEER REVIEWED

Tracks of the Conference

  • Access Control
  • Applied Cryptography
  • Biometrics Security and Privacy
  • Critical Infrastructure Protection
  • Data Integrity
  • Data Protection
  • Database Security and Privacy
  • Digital Forensics
  • Digital Rights Management
  • Ethical and Legal Implications of Security and Privacy
  • Formal Methods for Security
  • Human Factors and Human Behavior Recognition Techniques
  • Identification, Authentication and Non-repudiation
  • Identity Management
  • Information Hiding
  • Information Systems Auditing
  • Insider Threats and Countermeasures
  • Intellectual Property Protection
  • Intrusion Detection & Prevention
  • Management of Computing Security
  • Network Security
  • Organizational Security Policies
  • Peer-to-Peer Security
  • Personal Data Protection for Information Systems
  • Privacy
  • Privacy Enhancing Technologies
  • Reliability and Dependability
  • Risk Assessment
  • Secure Software Development Methodologies
  • Security and Privacy in Complex Systems
  • Security and Privacy in Crowdsourcing
  • Security and Privacy in IT Outsourcing
  • Security and Privacy in Location-based Services
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Smart Grids
  • Security and Privacy in Social Networks
  • Security and Privacy in the Cloud
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security in Distributed Systems
  • Security Information Systems Architecture
  • Security Management
  • Security Metrics and Measurement
  • Security Protocols
  • Security requirements
  • Security Verification and Validation
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust management and Reputation Systems
  • Ubiquitous Computing Security
  • Wireless Network Security

And these areas are not limited to the above said topics alone...


Proceedings Publications

All the registered papers of ICCS 2017 will be complied in the form of Proceedings with unique ISBN.

  • ISBN 13 : 978-81-933235-3-3
  • ISBN 10 : 81-933235-3-X

Journals Publications

Selected papers of the Conference publication may be recommended for publication in Reputed Journals (Print Edition) after acquiring the written consent from the authors of the paper(s) subject to any other fees related to the publication. Publication into the Journals is at the discretion of the Publisher(s) and not into the hands of ASDF or the Host Institute. Further, the waiting period of the Journal Publication will be mentioned in the Acceptance Letter and shall not be forced to modify at any sequence.

Click here to View the Journals

Paper Submission

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. Only original papers should be submitted. Authors are advised to follow ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

All the papers should be of 6 pages length and should adhere to the template prescribed in the ASDF KIT. Please read through the instructions in the below link before preparing the final template.

Download Paper Preparation KIT      Submit Paper Now

Important Dates

Description Date
Paper Submission 14 - January - 2017
Acceptance Notification Continuous Process
Author Registration 28 - January - 2017
CRC & Copyright Submission 28 - January - 2017
Listener Registration 31 - January - 2017
Conference Start Date 09 - February - 2017
Conference End Date 10 - February - 2017