Call for Papers
Papers representing original research in both the theory and practice concerning information, computer and communications security are solicited. Topics of interest include, but are not limited to:
|Public-Key Cryptography||Intrusion Detection|
|Symmetric-Key Cryptography||Security Analysis|
|Cryptographic Protocols||Software Security|
|Hash Functions||Hardware Security|
|Network Security||Mobile Security|
|Anonymity and Privacy||Fundamentals|
|RFID Security||Digital Rights Management|
|Security Policy||Information Hiding|
|Access Control||Quantum Cryptography|
- Submission Deadline: 1 October 2007, 15:00 UTC (closed)
- Author Notification: 28 November 2007 (extended)
- Camera-Ready Deadline: 8 December 2007 (extended)
Instructions for Preliminary Submissions
Submissions must not substantially duplicate work that has been published in, or submitted in parallel to, any journal, other conference or workshop that has proceedings. The paper must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The paper should be at most 12 pages excluding the bibliography and clearly marked appendices using reasonable font size and margins and at most 20 pages in total. (Although no specific format is required for submission, please keep in mind that the final paper will have to fit in 12 pages in the standard ACM two-column format.) The main body of the paper should be intelligible and self-contained as the committee members are not required to read the appendices. Submissions will take place entirely via a web system:
At least one of the authors of accepted papers must present the paper at the conference. Submissions not meeting the guidelines risk rejection without consideration of their merits.
See this page for preparing final camera-ready for proceedings.
Proceedings will be published by ACM Press and will be made available at the conference.