The 2006 International Conference on Information and Communications Security (ICICS '06) will be the eighth event in the ICICS conference series, started in 1997, that brings together researchers and scholars involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas.
ICICS 2006 seeks submissions from academia and industry presenting novel research on all aspects of information and communications security, as well as experimental studies of fielded systems. Topics of interest include, but are not limited to, the following:
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or another conference with proceedings. ICICS 2006 is open to two types of submissions: regular papers and short papers. Regular papers should be at most 15 pages, and short papers should have at most 6 pages, both excluding the bibliography and well-marked appendices, using at least 11-point font and reasonable margins on US letter-size paper (8.5 inch x 11 inch). Committee members are not required to read the appendices; submissions should be intelligible without them.
Short papers are intended for less mature work, and therefore the novelty and longer-term promise of such submissions will weigh more heavily in the reviewing process than their degree of high polish. Short papers accepted for the program will appear in the proceedings (with Short Paper in the title), and be presented orally during the symposium in suitably shorter speaking slots as a regular part of the program.
All paper submissions will be handled electronically. Papers must be submitted in PDF or portable PostScript format and must be received by the deadline of July 24, 2006 (
July 15, 2006). All submitted papers will be judged based on their quality through double-blind reviewing, where the identities of the authors are withheld from the reviewers. Authors' names must not appear in the paper or in the PostScript or PDF file.
Conference proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series, and will be available at the conference. Authors of accepted papers must guarantee that their paper will be presented at the conference.
ICICS 2006 submission is closed.
Important: In preparing your manuscript, do not include any information which could reveal your identity, or that of your co-authors. The title section of your manuscript should not contain any author names, email addresses, or affiliation status. If you do include any author names on the title page, your submission will be automatically rejected. In the body of your submission, you should eliminate all direct references to your own previous work. That is, avoid phrases such as "this contribution generalizes our results for XYZ". Also, please do not disproportionately cite your own previous work. In other words, make your submission as anonymous as possible. We need your cooperation in our effort to maintain a fair, blind reviewing process - and to consider all submissions equally.
Policy on Double Submissions and Plagiarism
ICICS '06 has explicit policy on double submissions and plagiarism, as stated in the submission instructions. The ICICS '06 organizing and program committees will notify the employers and the supervisors of the violators, and reserve the right to post the violators' names and affiliations on ICICS website.
|Submissions Due (extended):|
|Notifications Due:||September 15, 2006|
|Camera-ready Version Due:||October 1, 2006|
|Conference Dates:||December 4 - 7, 2006|