From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by c5ff346549e7 (Postfix) with ESMTPS id 4BE695D5 for ; Mon, 3 Jun 2019 16:09:33 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.60,547,1549926000"; d="scan'208,217";a="385786741" Received: from sympa.inria.fr ([193.51.193.213]) by mail2-relais-roc.national.inria.fr with ESMTP; 03 Jun 2019 18:09:32 +0200 Received: by sympa.inria.fr (Postfix, from userid 20132) id 2A33D8247D; Mon, 3 Jun 2019 18:09:32 +0200 (CEST) Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 059228247D for ; Mon, 3 Jun 2019 18:07:55 +0200 (CEST) Authentication-Results: mail3-smtp-sop.national.inria.fr; spf=None smtp.pra=mobilenetwork.chapter@gmail.com; spf=Pass smtp.mailfrom=mobilenetwork.chapter@gmail.com; spf=None smtp.helo=postmaster@mail-lf1-f65.google.com IronPort-PHdr: =?us-ascii?q?9a23=3A/taQCh/jLpTGFv9uRHKM819IXTAuvvDOBiVQ1KB3?= =?us-ascii?q?1u0cTK2v8tzYMVDF4r011RmVBNydsqkbwLuN+4nbGkU4qa6bt34DdJEeHzQksu?= =?us-ascii?q?4x2zIaPcieFEfgJ+TrZSFpVO5LVVti4m3peRMNQJW2aFLduGC94iAPERvjKwV1?= =?us-ascii?q?Ov71GonPhMiryuy+4ZLebxhViDanfL9/Ihe7oQrVu8QYnIBvNrs/xhzVr3VSZu?= =?us-ascii?q?9Y33loJVWdnxb94se/4ptu+DlOtvwi6sBNT7z0c7w3QrJEAjsmNXs15NDwuhnY?= =?us-ascii?q?UQSP/HocXX4InRdOHgPI8Qv1Xpb1siv9q+p9xCyXNtD4QLwoRTiv6bpgRxj0hS?= =?us-ascii?q?oJKzI17XjbhtBtgKlGpB6tuhxyz4vSbYqINvRxY7ndcMsVSmRBUMhfVDFPDJ2g?= =?us-ascii?q?YIYSFOcOJ/pUopPnqlcSsRezBw+hD/7vxD9SgX/22LU33vomEQHA0gwvAcgOv2?= =?us-ascii?q?rSrNrpKqgZTP64wqnSwz7eaP5W3DD955PJchAlv/6MW6x/cdbfyEkoDQPFjU+c?= =?us-ascii?q?ppDlPzyPzuQNr3aU7/B7WOKgjm4osQBxojy1ysgwjYnJg5sYx1bZ/it3x4Y1IM?= =?us-ascii?q?e3SE99YdO8DZtQqzuVN5FsTsw8Xm5opTw2yrgGuJO9YSMEy4wnygbBZ/Cbd4WE?= =?us-ascii?q?+BHuWeaLLTtlhX9oeqizihey/EWm1+byTNO70ExQoSpAitTMtm4C1xjU6sWfT/?= =?us-ascii?q?ty5Eah2TKW2wDX5OFIPFk4laTaJpMh2LIwmZ0TsUPMHi/yhkr6lrOZdkIh+uSw?= =?us-ascii?q?6uTnZKvppoOEOoNqlg3zNr4il8+/DOgiLwQDXmqW9f692bDj5UH5Ra9Fjvwykq?= =?us-ascii?q?nXqpDaIsEbq7a8Aw9SyYkj6hK/ACmg0NsGgXkGIlVFeAiEj4TzJ17OIOr3De+j?= =?us-ascii?q?g1uyijdm3P/GPrj7DZXMKnjPiqvufbF460JE0go80chf545ICrEGOP/8RlX+tN?= =?us-ascii?q?ncDhMgNwy0wv3nCMlm24MFWWOPB7eZP7nIvV+J4OIvOeiMa5UPtDbzMfh2r8Lp?= =?us-ascii?q?2Fo0n1BVQpvhiZ4QYnG8E/JrP1qee3mqidcICXsHpCIxSeXrjBuJVjsFNFioWK?= =?us-ascii?q?dpzTY9Bo+8AIHIS8iGroTJiCK8FJxSa2ZLFk+LC3SufIWNQ+sBcgqdJ8ZglnoP?= =?us-ascii?q?Ur33GNxp7g2nqAKvk+kvFeHT4CBN7M+6iIpFotbLnBR3zgRaStyH2jjUHW5xl2?= =?us-ascii?q?IMATQx2fIn+BEv+hK4yaF9xsdgO5lT6vdOCFpoMJfdy6l+BYm3VFycONiOT1mi?= =?us-ascii?q?T5OtBjRjFotgke9LWF50HpCZtj6G2iOrB7EPkLnSXc4796vd2z76IMMvkns=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ACFACjRPVcWEGnVdFmHgEGBwaBZYEPU?= =?us-ascii?q?y8mAQE2DFEzFBSEFIEdgl6aaHeIFod7CQEDAQwFHgwBAYFLhgkbBwEENBMBAwE?= =?us-ascii?q?BBAEBAgEBAwEGARcMCgYpJQyCOgyDKAYdARsMBQ0DEgMNNwIkAREBBQEIGhuDG?= =?us-ascii?q?4FpAQMJFA+OAIxvgx88iyCBFAUBF4J6BYQxChknDWCBOgIHEoEii1qCFoERhFS?= =?us-ascii?q?BXQGBGyCDMYJYBIsuH4hjlEkHAoIPhj+KQoIxG4IihnGNW5QLjCaDBg8hgRwpZ?= =?us-ascii?q?YEUcIEBgjsJgQ0BeAwMCxSDOYRLhgcONTABjnGCUgEB?= X-IPAS-Result: =?us-ascii?q?A0ACFACjRPVcWEGnVdFmHgEGBwaBZYEPUy8mAQE2DFEzFBS?= =?us-ascii?q?EFIEdgl6aaHeIFod7CQEDAQwFHgwBAYFLhgkbBwEENBMBAwEBBAEBAgEBAwEGA?= =?us-ascii?q?RcMCgYpJQyCOgyDKAYdARsMBQ0DEgMNNwIkAREBBQEIGhuDG4FpAQMJFA+OAIx?= =?us-ascii?q?vgx88iyCBFAUBF4J6BYQxChknDWCBOgIHEoEii1qCFoERhFSBXQGBGyCDMYJYB?= =?us-ascii?q?IsuH4hjlEkHAoIPhj+KQoIxG4IihnGNW5QLjCaDBg8hgRwpZYEUcIEBgjsJgQ0?= =?us-ascii?q?BeAwMCxSDOYRLhgcONTABjnGCUgEB?= X-IronPort-AV: E=Sophos;i="5.60,547,1549926000"; d="scan'208,217";a="308005948" X-MGA-submission: =?us-ascii?q?MDG1rPEe1Ny3X/CxN1is2UyXZF1eVVcHu58JFg?= =?us-ascii?q?ZND8VRx2pXYNU4g24/k1a0l4Mhu3WXSSZWqJNIxADcejrb3ioeQrK1HL?= =?us-ascii?q?AXH2mQeyBeBDfg0ZTLR8TDgONuDD/DqWt6SXnn+6GDXOeDW/kJeLZrgf?= =?us-ascii?q?tLklN32CqR3ejwlzljY1H4Wg=3D=3D?= Received: from mail-lf1-f65.google.com ([209.85.167.65]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 03 Jun 2019 18:07:53 +0200 Received: by mail-lf1-f65.google.com with SMTP id a25so14065761lfg.2 for ; Mon, 03 Jun 2019 09:07:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=sSc7DWwpB2NJyM1La0CPHh9n4xKWPNRX83KYjmWaSPg=; b=K/rpKpQcXnicqT1A1ro+xc61gc8tvC+8wE9S8wZ3CW8qdst+1HxmRoF3xxAwZqS/Mk JWL0P74dTQW+yJVp62wRBpfSGmHxwJfPg3tYhzbU0xCp+7dxaoBGhtPcVXBzrFgj/+ZK iucMzYwYmLFn2Lsdi/HolaYJYNVS0xzusl0w5K7qsWfCUsr87bb3fgXJxanjVtrOvMa0 8lnjqT/YLtjTyt9aXruSBhqUA8CBiBFaUHzfMJ097xB/Kbq9tJ9B69VTR07EhA+b6S6F 1NiNtCh+FuFpBtdFvFUazm+Cv1Ou5HAI/KRebOCXtRkBjHmHa7vHdQyLguIfPFJYrGid W+yw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=sSc7DWwpB2NJyM1La0CPHh9n4xKWPNRX83KYjmWaSPg=; b=q2XCV+6V6k40Nx0w19JwdcbAzWQtDl1yLmldBPXWsO1ZK2wgm0pwQvhKHRre1tOmZk Hlb26w5RIXlKexnF2lZnVyJvjz+WEzflca9Aof9gwzFZo5oEJRl5VUtz0e7+Gf5XJZiF VPxfa1fsLnG3eeKIVihmTAn1rIJmfw8SHIxXkSo5xIbqqgWoEZ3ZITCzSbgtew3SKR3h gdPxSVDbFcAbfXM3XI+OWidy0Pl0PpLIRLQ9fb1B2sTs48ndn02/nILrrBZHg4OjM/+u IxJAbhu/QP1j3lSfAOK+CPQ+NMyfcD0P1Pc2dNvZvDOqjFE/6XNBIHwamvHR9dkal5j9 Phqw== X-Gm-Message-State: APjAAAU316T4vrvLYhgkpw8TxeM8d0UwjSSt0q3qGngSFFYSCcWtuLzN knf5rvIbPBc5In1gx0L5aH3oD+OFgsTOdrWTEn0= X-Google-Smtp-Source: APXvYqy9MW5JLDwvHkTcL7+i2O1FvGhmTKG65xiHuxfB0ux/OoMql42OGyX17cBIF0wNxBQWWL2ZlZgHJlJ4SwORUPU= X-Received: by 2002:ac2:4313:: with SMTP id l19mr13590394lfh.124.1559578072917; Mon, 03 Jun 2019 09:07:52 -0700 (PDT) MIME-Version: 1.0 From: Conference CFP Date: Tue, 4 Jun 2019 00:07:41 +0800 Message-ID: To: Meng WZ Content-Type: multipart/alternative; boundary="000000000000092e5f058a6d919e" X-Validation-by: mobilenetwork.chapter@gmail.com Subject: [Caml-list] CFP ISPEC 2019 + 3 Special Issues (IEEE Access, DCN, Concurrency and Computation) Reply-To: Conference CFP X-Loop: caml-list@inria.fr X-Sequence: 17600 Errors-to: caml-list-owner@inria.fr Precedence: list Precedence: bulk Sender: caml-list-request@inria.fr X-no-archive: yes List-Id: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: --000000000000092e5f058a6d919e Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable --------------------- 15th International Conference on Information Security Practice and Experience (ISPEC 2019) Kuala Lumpur, Malaysia November 26-28, 2019 http://ccs.research.utar.edu.my/ispec2019/ ----------------------------- Call for Papers =E2=80=93 ISPEC 2019 The 15th International Conference on Information Security Practice and Experience (ISPEC 2019) will be held in Kuala Lumpur, Malaysia on November 26-28, 2019. The conference will be organised by Universiti Tunku Abdul Rahman (UTAR). The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors. Previous ISPEC has taken place in Singapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008), Xi'an, China (2009), Seoul, Korea (2010), Guangzhou, China (2011), Hangzhou, China (2012), Lanzhou, China (2013), Fuzhou, China (2014), Beijing, China (2015), Zhangjiajie, China (2016), Melbourne, Australia (2017) and Tokyo, Japan (2018). For all sessions, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series. Areas of interest for ISPEC 2019 include, but are not limited to: Cryptology Applied cryptography Mobile security Cloud security Access control Privacy enhanced technology Viruses and malware Software security Database security Web security Operating system security Intrusion detection Big data security and privacy Biometric Security Implementation Network security Key management Security and privacy in ubiquitous computing Formal methods for security Digital forensics Security for critical infrastructures Embedded systems security Lightweight security Smart grid security Cyber security for urban transportation Cyber-physical security Cryptocurrency Important Dates: Submission Deadline: 8 June 2019 (15:59 UTC) Acceptance Notification: 29 July 2019 Camera-ready Copy Due: 3 September 2019 Conference: 26-28 November 2019 Instructions for Authors: Authors are invited to submit original papers. Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other conference with proceeding or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column) excluding the bibliography and appendices and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference to present their work. Submitted papers should follow the formatting instructions of the Springer LNCS Style. Please kindly refer to Springer LNCS Author Information for style and formatting guidelines. Conference Proceedings: The conference proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series. *Journal Special Issues:* Selected papers presented at the ISPEC 2019 will be invited to consider submission (after significant extension) for special issue in the following journals: IEEE Access: Special Issue on Deep Learning: Security and Forensics Research Advances and Challenges (Impact Factor: 3.557) Concurrency and Computation: Practice and Experience: Special Issue on Trust Management and Security Enforcement in Internet of Things (TMSEIoT 2019) (Impact Factor: 1.114) DCN: Special Issue on Security and Privacy Protection in the Era of IoT Devices Honored Chair Bok-Min Goi, Universiti Tunku Abdul Rahman, Malaysia General Chair Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia Organization Committee Local Chair: Denis C.K. Wong, Universiti Tunku Abdul Rahman, Malaysia Finance Chair: Yee-Kai Tee, Universiti Tunku Abdul Rahman, Malaysia Sponsorship Chair: Wai-Kong Lee, Universiti Tunku Abdul Rahman, Malaysia Web Chair: Ji-Jian Chin, Multimedia University, Malaysia Publicity Co-Chairs: Weizhi Meng, Technical University of Denmark, Denmark Donghong Qin, Guangxi University for Nationalities, China Shifeng Sun, Monash University, Australia Program Co-Chairs Swee-Huay Heng, Multimedia University, Malaysia Javier Lopez, University of Malaga, Spain --000000000000092e5f058a6d919e Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
=
---------------------
15th = International Conference on Information Security Practice and
Experience= (ISPEC=C2=A02019)

Kuala Lumpur, MalaysiaNovember 26-28,=C2=A02019

http://ccs.r= esearch.utar.edu.my/ispec2019/
-----------------------------
Call= for Papers =E2=80=93=C2=A0ISPEC=C2=A02019

T= he 15th International Conference on Information Security Practice and
Ex= perience (ISPEC=C2=A02019) will be held in Kuala Lu= mpur, Malaysia on
November 26-28,=C2=A02019. The conference = will be organised by Universiti
Tunku Abdul Rahman (UTAR).=C2=A0 The mai= n goal of the conference is to
promote research on new information secur= ity technologies, including
their applications and their integration wit= h IT systems in various
vertical sectors. Previous=C2=A0ISPEC=C2=A0has taken place in Singapore (2005),
Hangzhou, China (2006), Hong= Kong, China (2007), Sydney, Australia
(2008), Xi'an, China (2009), = Seoul, Korea (2010), Guangzhou, China
(2011), Hangzhou, China (2012), La= nzhou, China (2013), Fuzhou, China
(2014), Beijing, China (2015), Zhangj= iajie, China (2016), Melbourne,
Australia (2017) and Tokyo, Japan (2018)= . For all sessions, the
conference proceedings were published by Springe= r in the Lecture Notes
in Computer Science series.

Areas of inter= est for=C2=A0ISPEC=C2=A02019=C2=A0include, but are = not limited to:

Cryptology
Applied cryptography
Mobile securit= y
Cloud security
Access control
Privacy enhanced technology
Vir= uses and malware
Software security
Database security
Web security<= br>Operating system security
Intrusion detection
Big data security an= d privacy
Biometric Security
Implementation
Network security
Ke= y management
Security and privacy in ubiquitous computing
Formal meth= ods for security
Digital forensics
Security for critical infrastructu= res
Embedded systems security
Lightweight security
Smart grid secu= rity
Cyber security for urban transportation
Cyber-physical security<= br>Cryptocurrency


Important Dates:
Submission Deadline:=C2=A0= =C2=A0 =C2=A0 =C2=A0 8 June=C2=A02019=C2=A0(15:59 UTC)
Acce= ptance Notification:=C2=A0 =C2=A0 29 July=C2=A02019
Camera-r= eady Copy Due:=C2=A0 3 September=C2=A02019
Conference:=C2=A0= =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 26-28 November=C2=A02019

Instructions for Authors: Authors are invited to submit originalpapers. Submissions must not substantially duplicate work that any of
= the authors has published elsewhere or has submitted in parallel for
con= sideration of any other conference with proceeding or any journal.
The s= ubmission must be anonymous, with no author names, affiliations,
acknowl= edgements, or obvious references. Original contributions are
invited up = to 16 pages in length (single column) excluding the
bibliography and app= endices and up to 20 pages in total, using at
least 11-point fonts and w= ith reasonable margins. Submissions not
meeting the submission guideline= s risk rejection without consideration
of their merits. Authors of accep= ted papers must guarantee that at
least one of the authors will register= and attend the conference to
present their work. Submitted papers shoul= d follow the formatting
instructions of the Springer LNCS Style. Please = kindly refer to
Springer LNCS Author Information for style and formattin= g guidelines.

Conference Proceedings: The conference proceedings wil= l be published
by Springer-Verlag in the Lecture Notes in Computer Scien= ce series.

Jou= rnal Special Issues:=C2=A0Selected papers presented at the=C2=A0IS= PEC=C2=A02019=C2=A0will be invited to consider submissio= n (after significant extension) for special issue in the following journals= :

IEEE Access:= Special Issue on Deep Learning: Security and Forensics Research Advances a= nd Challenges (Impact Factor: 3.557)

Concurrency and Computation: Practice and Experienc= e: Special Issue on Trust Management and Security Enforcement in Internet o= f Things (TMSEIoT=C2=A02019) (Impact Factor: 1.114)

<= div style=3D"text-align:justify">DCN: Special Issue on=C2=A0Security and Privacy Protection in the Era of IoT Devices
=
Honored Chair
Bok-Min Goi, Universiti Tunku Abdul Rahman, Malaysia
General Chair
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia=

Organization Committee
Local Chair: Denis C.K. Wong, Universiti = Tunku Abdul Rahman, Malaysia

Finance Chair: Yee-Kai Tee, Universiti = Tunku Abdul Rahman, Malaysia

Sponsorship Chair: Wai-Kong Lee, Univer= siti Tunku Abdul Rahman, Malaysia

Web Chair: Ji-Jian Chin, Multimedi= a University, Malaysia

Publicity Co-Chairs:
Weizhi Meng, Technica= l University of Denmark, Denmark
Donghong Qin, Guangxi University for Na= tionalities, China
Shifeng Sun, Monash University, Australia

Prog= ram Co-Chairs
Swee-Huay Heng, Multimedia University, Malaysia
Javier = Lopez, University of Malaga, Spain=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0



--000000000000092e5f058a6d919e--