Saturday, May 16, 2015

[DMANET] [CFP] Symposium of Privacy and Security in Communications of IEEE/CIC ICCC 2015

---------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------
IEEE/CIC International Conference on Communications in China
2-4 November 2015, Shenzhen, China
Conference Website: http://www.ieee-iccc.org/
----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------

IEEE/CIC International Conference on Communications in China (ICCC 2015)
will be held in Shenzhen, China, 2-4 November, 2015. This conference will
feature world-class plenary speakers, major technical symposia, industry
and academic panels, tutorials and workshops. The technical program chairs
invite the submission of original papers to following symposia for
presentation and publication in the conference proceedings. Accepted and
presented papers will be submitted to IEEE Xplore. Best paper awards will
be selected from accepted papers.

-----------------------------------------------------------------------------------------------------------
Symposium of Privacy and Security in Communications of IEEE/CIC ICCC 2015
-------------------------------------------------------------------------------------------------------------
With the proliferation of many innovative data communications services such
as social networks, cloud computing, location-based service, and Internet
of Things, security and privacy issues become more and more demanding and
challenging. This symposium aims to bring together academics and industry
professionals working on the security and privacy aspects of data
communications and computer networks, and provide a forum to present and
discuss emerging ideas, progresses and trends in this highly challenging
research field. Topics of interest include, but are not limited to:

l Privacy and security in mobile and wireless communications

l Privacy and security in grid and cloud computing

l Privacy and security in pervasive and ubiquitous computing

l Privacy and security in location-based service

l Privacy and security in social networks

l Privacy and security in Internet of Things

l Big Data security and privacy

l Anonymity, anonymous communication, metrics and their performance
analysis

l Computer and network forensics

l Cryptography and evaluation

l Intrusion detection and protection systems

l Data center security

l Mobile App security and privacy

l Network public opinion analysis and monitoring

l Network security metrics and their performance evaluation

l Quantum cryptography and communication applications

l Resource allocation, incentives, and game-theoretic approaches

l Privacy and security in virtual machine environments

l Privacy and security in wired systems and optical networks

l Privacy and security of Cyber-physical systems

l Virtual private networks and group security

l Cognitive Security and privacy

l Security and access control of critical infrastructure





Submission Guidelines
-----------------------------------
The submitted papers should be original, not published or currently under
review for publications in any other journal or conference. All submissions
must be formatted in standard IEEE camera-ready format and must be written
in English and be at most six (6) printed pages in length, including
figures. Papers should be submitted through EDAS System. For full details,
please visit the following website: http://www.ieee-iccc.org/submguide.html

Important dates:
Paper Submission Deadline: June 1st, 2015
Acceptance Notification: Sep. 1st, 2015.
Camera-Ready: Sep. 15th, 2015.

Symposium Co-Chairs

Haojin Zhu, Shanghai Jiao Tong University, China (zhu-hj@cs.sjtu.edu.cn)
Rongxing Lu, Nanyang Technological University, Singapore (rxlu@ntu.edu.sg)

Sushmita Ruj, Indian Statistical Institute, India (sush@isical.ac.in)

**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************