Welcome to ICICS 2019!

The 2019 International Conference on Information and Communications Security will be the 21st event in the ICICS conference series, started in 1997, that brings together individuals involved in multiple disciplines of Information and Communications Security in order to foster exchange of ideas. There will be Best Paper and Best Student Paper awards with cash reward sponsored by Springer. It will be organized by Peking University and Institute of Information Engineering, Chinese Academy of Sciences.

New Notice
Accepted papers information has been updated
Registration and Organization information has been updated
Mauro Conti's keynote information has been updated
If you have any questions, please contact us by icicsgroup@163.com
New Notice
Registration information and form have been updated
Hotel information and reservation form have been updated
Robert Deng's keynote information has been updated
New Notice
PC members have been updated
New Notice
Notification of acceptance date is updated to 13 Nov 2019
Camera-ready due is updated to 28 Nov 2019
PC members have been updated
New Notice
Paper submission deadline is extended to 17 Sept 2019 (23:59 AOE)
New Notice
Confirmed keynote speaker, Prof. Mauro Conti (https://www.math.unipd.it/~conti)
New Notice
There will be Best Paper and Best Student Paper awards with cash reward sponsored by Springer.
New Notice
Confirmed keynote speaker, Prof. Robert Deng (https://www.smu.edu.sg/faculty/profile/9611/Robert-H-DENG)

Important dates:

Paper submission deadline: 10 Sept 2019 (23:59 AOE) 17 Sept 2019 (23:59 AOE)
Notification of acceptance: 13 Nov 2019
Camera-ready due: 28 Nov 2019
Conference: 15-17 Dec 2019

Previous Conferences:

The 2019 International Conference on Information and Communications Security(ICICS 2019) will be the 21st event in the ICICS conference series.

The proceedings were released as the LNCS series of Springer.

ICICS 2018 Lille, France LNCS11149
ICICS 2017 Beijing, China LNCS10631
ICICS 2016 Singapore LNCS9977
ICICS 2015 Beijing, China LNCS9543
ICICS 2014 Hong Kong, China LNCS8958
ICICS 2013 Beijing, China LNCS8233
ICICS 2012 Hong Kong, China LNCS7618
ICICS 2011 Beijing, China LNCS7043
ICICS 2010 Barcelona, Spain LNCS6476
ICICS 2009 Beijing, China LNCS5927
ICICS 2008 Birmingham, UK LNCS5308
ICICS 2007 Zhengzhou, China LNCS4861
ICICS 2006 Raleigh, USA LNCS4307
ICICS 2005 Beijing, China LNCS3783
ICICS 2004 Malaga, Spain LNCS3269
ICICS 2003 Hohhot, China LNCS2836
ICICS 2002 Singapore LNCS2513
ICICS 2001 Xi'an, China LNCS2229
ICICS 1999 Sydney, Australia LNCS1726
ICICS 1997 Beijing, China LNCS1334

Program Topics:

Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2019. Areas of interest include, but are not limited to:

  • Access control
  • Social networks security, privacy and trust
  • Key management and key recovery
  • Software defined networking security
  • Anonymity
  • Embedded systems security
  • Language-based security
  • Security management
  • Applied cryptography
  • Security models, metrics, and policies
  • Malware and anti-malware
  • Fraud and cyber-crime
  • Authentication and authorization
  • Security and privacy of Big Data
  • Mobile computing security and privacy
  • Hardware security
  • Biometrics security
  • Security of critical Infrastructures
  • Network security
  • Identity access management
  • Blockchain security and privacy
  • Trust and reputation systems
  • Cloud computing and edge computing security
  • Trusted and trustworthy computing technologies
  • Operating systems security
  • Usable security and privacy
  • Computer and digital forensics
  • Insider threat detection
  • Cyber-physical systems security
  • Underground economy
  • Privacy protection
  • Intellectual property protection
  • Data and system integrity
  • Verification of security protocols
  • Privacy-preserving data mining
  • Intrusion detection
  • Database security
  • Web security
  • Risk assessment
  • IoT security and privacy
  • Distributed systems security
  • Wireless security