################################################################################
13th International Conference on Security, Privacy and Anonymity in 
Computation,
Communication and Storage (SpaCCS 2020)

Nanjing, China. October 23-25, 2020
################################################################################

URL: http://www.spaccs2020.com/


==================
IMPORTANT DATES
==================

* Submission Deadline: May 23, 2020
* Authors Notification Due: July 23, 2020
* Final Version Due: August 23, 2020


==================
CALL FOR PAPERS
==================

The SpaCCS 2020 conference is the 13th event in the series of 
conferences which are devoted to security, privacy and anonymity in 
computation, communication and storage. SpaCCS is now recognized as the 
main regular event of the world that is covering many dimensions 
including security algorithms and architectures, privacy-aware policies, 
regulations and techniques, anonymous computation and communication, 
encompassing fundamental theoretical approaches, practical experimental 
projects, and commercial application systems for computation, 
communication and storage. As applications of computer systems and 
networks have permeated in every aspect of our daily life, the issues of 
security, privacy, and anonymity have become increasingly critical. The 
conference will provide a forum for the world-class researchers to 
gather and share their research achievements, emerging ideas and trends 
in the highly challenging research fields.

==================
Topics of interest include, but are not limited to:
==================

Track1: Security

- Security Model and Architecture
- Software and System Security
- Secure computation
- Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
- Artificial Intelligence
- Secure Network Computing
- Risk Analysis and Management
- Network Security
- Malware and Botnets
- Intrusion Detection
- Security in Web Services
- Security in Mobile Social Networks
- Security in Mobile and Wireless Communications
- Fraud and Cyber-Crime
- Access Control
- Accounting and Audit
- Applied Cryptography
- Database Security
- Authentication
- Computer forensics
- Data Protection and Data Integrity
- Digital Content Protection and Digital Forensics
- Information Hiding
- Security in Big Data and its Applications

Track 2: Privacy

- Measuring and Quantifying Privacy
- Privacy Modelling and Analysis
- Software and System Privacy
- Privacy-preserving Computing
- Differential Privacy
- Blockchain
- Privacy-enhanced Network Computing
- Obfuscation-based Privacy
- Cryptographic Tools
- Building and Deploying Privacy-enhancing Systems
- Reliability, Robustness, and Abuse Prevention in Privacy Systems
- Privacy in Web Services
- Privacy Metrics and Policies
- Crowdsourcing for Privacy
- Location and Mobility Privacy
- Privacy in Cloud and Big Data Applications
- Quantum Communications
- Privacy in Ubiquitous Computing and Mobile Devices
- Privacy in Social Networks and Microblogging Systems
- Privacy-enhanced Access Control, Authentication, and Identity Management
- Policy Languages and Tools for Privacy
- Interdisciplinary Research Connecting Privacy to Other Fields
- Information Leakage, Data Correlation and Generic Attacks to Privacy
- Privacy-Preserving Data Mining, Data Release and Publishing

Track 3: Anonymity

- Anonymous Data Mining and Data Sharing
- Parallelism Exploitation Techniques for Anonymity
- Anonymity in Big Data Analytics
- Anonymous Management in Trust Relationships
- Anonymous Video Analytics Technology
- Anonymity Metrics, Measures and Evaluations
- Anonymity Models, Hardware/Device of Anonymity
- Anonymity in Wireless Communication Systems
- Anonymous Communication Protocols
- Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
- Anonymous Proxy Software
- Anonymous Communication and Internet
- Anonymous Social Networks, Structural k-Anonymity in Social Networks
- Authentication Protocol Providing User Anonymity
- Anonymous Information Storage and Management
- Private and Anonymous Data Storage
- Forensics
- Anonymity-Preserving Data Collection and Database
- Anonymity, Pseudonymity & Identity Management
- Anonymity in Big Data and Cloud Scenarios
- Anonymity in Health and Medical Databases


==================
Paper Submission
Paper Submission
==================

All papers need to be submitted electronically through the conference 
website (https://easychair.org/conferences/?conf=spaccs2020) with PDF 
format. Submitted papers must not substantially overlap with papers that 
have been published or that are simultaneously submitted to a journal or 
a conference with proceedings. Papers must be clearly presented in 
English, must not exceed 14 pages (or up to 20 pages with the pages over 
length charge) in Springer LNCS format 
(https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines), 
including tables, figures, references and appendices. Papers will be 
selected based on their originality, significance, relevance, and 
clarity of presentation assessed by at least three reviewers. Submission 
of a paper should be regarded as a commitment that, should the paper be 
accepted, at least one of the authors will register and attend the 
conference to present the work.

All accepted papers will be published by Springer LNCS (EI Indexed). 
Best Paper Awards will be presented to high quality papers. 
Distinguished papers, after further revisions, will be published in SCI 
& EI indexed prestigious journals (More special issues will be added later).

All accepted papers will be published by Springer LNCS (EI Indexed). 
Best Paper Awards will be presented to high quality papers. 
Distinguished papers, after further revisions, will be published in SCI 
& EI indexed prestigious journals (More special issues will be added later).


==================
Special Issues
==================

1. Future Generation Computer Systems
  Special Issue on Artificial Intelligence: The Security & Privacy 
Opportunities and Challenges for Emerging Applications
  https://www.journals.elsevier.com/future-generation-computer-systems/call-for-papers/the-security-privacy-opportunities
  Publisher: Elsevier, IF: 4.639

2. IEEE Access
  Special section on IoT attacks and defence
  https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639
  Publisher: IEEE, IF: 4.098

3. Multimedia Tools and Applications
  Special Issue: Blockchain-based multimedia security(SI:1159T)
  https://www.springer.com/journal/11042/updates/17192684
  Publisher: Springer, IF = 2.101

4. International Journal of Distributed Sensor Networks
  Special Issue: Security and Privacy in Internet of Things
  https://journals.sagepub.com/page/dsn/collections/special-issues/security-and-privacy-in-internet-of-things
  Publisher: SAGE journals, IF = 1.614

5. Wireless Communications and Mobile Computing (WCMC) Journal
  Special Issue: Security and Privacy in New Computing Environments
  https://www.hindawi.com/journals/wcmc/
  Publisher: Hindawi, IF: 1.396

6. Security and Communication Networks
  Special Issue: Machine Learning for Wireless Multimedia Data Security
  https://www.hindawi.com/journals/scn/2019/7682306
  Publisher: Hindawi, IF: 1.376

7. Concurrency and Computation Practice and Experience, IOS Press
  Special Issue: Special Issue on Secure Smart World (S2World2020)
  http://www.cc-pe.net/journalinfo/issues/2020.html
  Publisher: WILEY, IF: 1.114

8. Connection Science
  https://www.tandfonline.com/loi/ccos20
  Publisher: Taylor & Francis Online, IF: 0.673

9. Digital Communications and Networks
  Special Issue: Security and Privacy Protection in the Era of IoT Devices
  http://www.keaipublishing.com/en/journals/digital-communications-and-networks/call-for-papers/special-issue-on-security-and-privacy-protection/
  Publisher: KeAi

-- 
Marco Guazzone, PhD
Computer Science Institute, DiSIT
University of Piemonte Orientale
address: Viale T. Michel 11, 15121 Alessandria, Italy
phone: +39-0131-360484
web: http://people.unipmn.it/sguazt

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------