News & Events

  • Call for paper 2022 China Computer Networks and Information Security Conference (CCNIS 2022)

    The 15th China Computer Networks and Information Security Conference & 2022 International Cyberspace Security Academic Summit Forum

    October 25-27, 2022, Zhenjiang, China

    Introduction to the meeting

    The 15th China Computer Networks and Information Security Conference & 2022 International Cyberspace Security Academic Summit Forum (ICSC) will be held in Zhenjiang, China on October 25-27, 2022. The organizers are Jiangsu University and Beijing Xintong Media Co., LTD.

    Chinese computer network and information security conference consists of xian university of electronic science and technology, national computer network intrusion prevention center, the national computer virus emergency response center, urged the editorial board of Journal on Communications and China electronics technology group co., LTD. 36 institute (control and security communication information technology key laboratory), launched by the unit and the host. Aimed to explore the computer network and information security and related latest progress and developing trend, showing China's computer network and information security is the most important achievements of academic, technical and academic, for the domestic and foreign computer network and information security researchers, developers, and users to build an academic exchange platform, professionals in the field of different can get the opportunity to communicate, This paper discusses the achievements and experiences in the research and application of computer network and information security, as well as the key challenges and research directions.

    Excellent papers accepted and selected by the program committee will be recommended to Symmetry》(SCI)、《Chinese Journal of Electronics》(SCI)、《Acta Electronica Sinica》(EI)、《Journal on Communications》(EI)、《Journal of Computer Research and Developmen》(EI)、《Journal of Xidian University》(EI)、《Journal of Cyber Security》(Chinese Core Journals of Science and Technology)、《Telecommunications Science》(Chinese Core Journals of Science And Technology)、《Journal of Jiangsu UniversityNatural Science Edition)》(Natural Science Chinese Science and Technology Core Journals.

     

    Scope of Subject

    The scope of the subject is as follows, including but not limited to these areas.

    1. Information security algorithms: including password algorithm, information hiding and detection algorithm, digital watermark embedding and detection algorithm, image tamper authentication algorithm, privacy data mining and filtering algorithm, quantum cryptography algorithm, etc.

    2. Information security protocol: including authentication protocol, key exchange and management protocol, electronic payment protocol, secure multi-party computing protocol, security analysis theory and method of security protocol, etc.

    3. Information system security: including trusted computing, access control, anonymity, security architecture, distributed system security, operating system security, database security and information system security assessment theory and method.

    4. Network system security: including information confrontation, network attack and defense, security testing, intrusion detection, network survivability, security management, wireless network security, as well as malicious code detection, defense and emergency treatment, etc.

    5. Cloud computing and Internet of Things Security: Cloud computing/Internet of Things security model, cloud computing/Internet of Things security requirements and policies, cloud computing/Internet of Things user privacy protection, cloud computing/Internet of Things infrastructure security protection.

    6. Big data security: user privacy protection, credibility of big data, access control of big data in big data.

    7. Intelligent security: security intelligence analysis technology, the antagonism in the field of attack and defense, based on the generated type (GAN) against network attack and defense, in view of the collaborative model of privacy and protection of theft, vulnerability to dig deep learning algorithm, the security applications of artificial intelligence algorithms, artificial intelligence algorithm security theory research.

    8. Security chip: cryptographic algorithm and protocol implementation, security processor and coprocessor design, chip attack and security protection, security chip application.

    9. Data and Application Security: Digital rights management, the application layer security policy, security, information sharing, security, knowledge management, data transmission and control, data forensics, encryption, data retrieval, GIS spatial data security and safety of semantic Web, software, service/Web service/service computing/SOA security, virtual machine safety, social network/social security, medical/health/e-commerce e-government Therapy/e-education security, application security infrastructure, etc.

    10. Privacy, Risk and Trust: Privacy enhancement Technology, Privacy Protection computing, Privacy Policy, Privacy information retrieval, Privacy theory and Engineering; Risk analysis, modeling and management; Trust formalization, modeling, management, and evaluation.

    11. E-commerce security: electronic payment protocol, e-commerce certification, e-commerce security architecture, mobile e-commerce security, etc.

    12. New information security technologies: network architecture, routing/switching technology, network coding, cognitive network, software-defined network, data center network, and parallel/distributed computing, ubiquitous computing, service computing, wearable computing, mobile Internet, big data applications, etc.

    13. Digital currency and blockchain technology: Digital currency and blockchain security and privacy protection technology, new blockchain protocol design, blockchain application security, etc.

    14. Physical layer security direction: including radio frequency individual identification, physical layer feature characterization, physical layer authentication, etc.

     

    Essay Requirements

    1. The paper must be the latest research results of the author, the signature is not disputed, the data is real and reliable, and has important academic value and promotion and application value; The results are unpublished (and have not been submitted to other journals or conferences for review); The manuscript can be written in Chinese or English.

    2. The paper is usually no more than 8000 words, please use Word to write, according to the "Journal on Communications" template for final draft, upload the manuscript to Word version.

    3. In order to ensure the quality of papers, all papers are reviewed by double-blind mechanism. After the paper is accepted by the conference, the author (at least one) must attend the conference for the paper exchange. The program committee of the Conference will recommend the paper to the corresponding journal (the author should bear the evaluation fee and layout fee of the corresponding journal), and the paper will be finalized according to the format of the corresponding journal after acceptance. Once the paper is accepted, the application for withdrawal is not accepted in principle.

     

    Conference website

    http://ccnis.xintongconference.com

     

    Time Arrangement

    Submission deadline: May 8, 2022

    Admission notice: May 31, 2022

     

    Organizational structure

    The organizer:

    Xidian University

    National Computer Network Intrusion Prevention Center

    National Computer Virus Emergency Response Center

    Editorial Board of Journal on Communications

    36th Research Institute of China Electronics Technology Group Corporation (Key Laboratory of Communication Information Control and Security Technology)

     

    The undertaker:

    Jiangsu university

    China Infocom Media Group

     

    Contact Us

    Conference email: ccnis2022@163.com

    Contact: 010-81055480

  • Pubdate: 2022-04-21    Viewed: 275
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: