Eighth International Conference on Information and Communications Security (ICICS '06)

Call for Papers (PDF)

The 2006 International Conference on Information and Communications Security (ICICS '06) will be the eighth event in the ICICS conference series, started in 1997, that brings together researchers and scholars involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.

ICICS 2006 seeks submissions from academia and industry presenting novel research on all aspects of information and communications security, as well as experimental studies of fielded systems.  Topics of interest include, but are not limited to, the following:

  • Access Control and Audit
  • Anonymity and Pseudonymity
  • Authentication
  • Automated and Large-Scale Attacks
  • Biometrics
  • Commercial and Industrial Security
  • Data Integrity
  • Database security
  • Denial of Service
  • Distributed Systems Security
  • Electronic Privacy
  • Information Flow
  • Intrusion Detection
  • Language-Based Security
  • Malicious Code
  • Mobile Code and Agent Security
  • Network Security
  • Peer-to-Peer Security
  • Secure Hardware and Smartcards
  • Security Protocols
  • Security Verification
  • Security of Emerging Networks (e.g., Ad-Hoc Networks)

Submission Instructions

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or another conference with proceedings. ICICS 2006 is open to two types of submissions: regular papers and short papers. Regular papers should be at most 15 pages, and short papers should have at most 6 pages, both excluding the bibliography and well-marked appendices, using at least 11-point font and reasonable margins on US letter-size paper (8.5 inch x 11 inch). Committee members are not required to read the appendices; submissions should be intelligible without them.

Short papers are intended for less mature work, and therefore the novelty and longer-term promise of such submissions will weigh more heavily in the reviewing process than their degree of high polish. Short papers accepted for the program will appear in the proceedings (with Short Paper in the title), and be presented orally during the symposium in suitably shorter speaking slots as a regular part of the program.

All paper submissions will be handled electronically.  Papers must be submitted in PDF or portable PostScript format and must be received by the deadline of July 24, 2006 (July 15, 2006).  All submitted papers will be judged based on their quality through double-blind reviewing, where the identities of the authors are withheld from the reviewers.  Authors' names must not appear in the paper or in the PostScript or PDF file.

Conference proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series, and will be available at the conference.  Authors of accepted papers must guarantee that their paper will be presented at the conference.

ICICS 2006 submission is closed.

Important: In preparing your manuscript, do not include any information which could reveal your identity, or that of your co-authors. The title section of your manuscript should not contain any author names, email addresses, or affiliation status. If you do include any author names on the title page, your submission will be automatically rejected. In the body of your submission, you should eliminate all direct references to your own previous work. That is, avoid phrases such as "this contribution generalizes our results for XYZ". Also, please do not disproportionately cite your own previous work. In other words, make your submission as anonymous as possible. We need your cooperation in our effort to maintain a fair, blind reviewing process - and to consider all submissions equally.

Policy on Double Submissions and Plagiarism

ICICS '06 has explicit policy on double submissions and plagiarism, as stated in the submission instructions. The ICICS '06 organizing and program committees will notify the employers and the supervisors of the violators, and reserve the right to post the violators' names and affiliations on ICICS website.

Important Dates

Submissions Due (extended): July 15, 2006 July 24, 2006
Notifications Due: September 15, 2006
Camera-ready Version Due: October 1, 2006
Conference Dates: December 4 - 7, 2006
©2006 Peng Ning . All rights reserved.