2019 ACM International Symposium on Blockchain and
Secure Critical Infrastructure (BSCI 2019)

will be held in conjunction with The 14th ACM ASIA Conference on Information, Computer
and Communications Security (ACM ASIACCS 2019)
July 7-12, Auckland, New Zealand.


Home | Dates | CFP | Organizers | Program | Submission | Registration | Venue |

Important Dates

Submissions Due:
Notification:
Camera-ready Due:
Conference Date:
 March 20, 2019 (extended)
 April 10th, 2019
 May 12, 2019
 July 7-12, 2019
 

Call for Papers  


Best Paper and Best Student Paper awards have been announced at AsiaCCS 2019 banquet.

Best Paper Award:
Paper Title: DISTRIBUTED COMMUNITY DETECTION OVER BLOCKCHAIN NETWORKS BASED ON STRUCTURE ENTROPY
Authors: YANG CHEN, JIAMOU LIU

Best Student Paper Award:
PROOF-OF-PLAY: A NOVEL CONSENSUS MODEL FOR BLOCKCHAIN-BASED PEERTO- PEER GAMING SYSTEM
Authors: HO YIN YUEN, FEIJIE WU, WEI CAI, HENRY C.B. CHAN, QIAO YAN, VICTOR C.M. LEUNG


Technical program of BSCI 2019 has been released.

Submission is still available for papers that are rejected by AsiaCCS 2019.

[Important] ACM camera-ready submission link is available: www.scomminc.com/pp/acmsig/bsci.htm. Please upload you paper's final file by May 12th, 2019. Please note that the camera-ready submission shall be editable, e.g. doc, docx, LaTex, etc. (A PDF document is not considered an editable manner.) Please refer to the link above for detailed instruction.

Blockchain is a decentralized transaction and data management technology that was voiced by its implementation in Bitcoin. In recent years, Blockchain has been achieving an ever-growing popularity. The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third-party organization in control of the transactions, and therefore it is applied in numerous fields, including securing critical infrastructure.

As technology advanced, critical infrastructures increasingly come to rely on digital control systems and networking. Attacks on critical infrastructure sites are currently a fact of life rather than a potential threat. For example, power stations, chemical plants, telecommunication stations and nuclear facilities are tempting targets to cyber-attacks.

In this scene, the question remains on why and how we can utilize blockchain techniques to secure critical infrastructure. Prior methods of protecting critical infrastructure have been plagued by centralized weaknesses and single points of failure problems. Contemporarily, Blockchain can offer cryptography for transactions and data in trustless distributed networks to enhance the reliability and resilience of the critical infrastructure. In other words, increasingly open and security needs is forcing us to shore up defenses with developing blockchain technology to help secure distributed critical infrastructure.

The aim of this academic get-together, ACM International Symposium on Blockchain and Secure Critical Infrastructure, is to collect latest research results concerning Blockchain and secure critical infrastructure on relevant scenarios, such as the ones subsequently listed. Researchers, experts, and scholars from both industry and academia are encouraged to share their recent studies, investigations, and findings in this forum.

Topics of particular interest include, but are not limited to:

  • Current state of Blockchain and Secure Critical Infrastructure
  • Technical issues of Blockchain and Secure Critical Infrastructure (architecture, functionality, workflows, availability, scalability, challenges of implementation, etc.)
  • Security and Privacy in Blockchain and Critical Infrastructure
  • Attacks on Blockchain and Critical Infrastructure
  • Blockchain and Secure Critical Infrastructure with 5G
  • Blockchain and Secure Critical Infrastructure with Smart Grid
  • Blockchain and Secure Critical Infrastructure with Industrie 4.0
  • Impact on business models (change of existing business models, emergence of new business models, disruptive business models, etc.)
  • Blockchain Advance in Secure Smart Grid
  • The future applications of Blockchain and Secure Critical Infrastructure in different areas (finance, insurance, healthcare and pharmaceuticals, energy sector, education, transportation, media production, government sector etc.)

In addition to the technical research achievements, all qualified submissions in relevant subtopics (including novel industrial topics) not mentioned here are welcomed, too. Nevertheless, articles focusing on describing standards or commercial purposes are not considered as acceptable contents for this symposium. High quality submissions will be recommended to a few journal special issues that are currently being applied for.

Submission Instructions

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized. Submissions must be in double-column ACM SIG Proceedings format, and should not exceed 12 pages. Position papers describing the work in progress are also welcome. Only pdf files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of the paper must be registered at the appropriate conference rate. Accepted papers will be published in the ACM Digital Library. This symposium will grant a few awards, including ACM Best Paper Award and ACM Best Student Award.

Paper submission site: https://easychair.org/conferences/?conf=bsci2019.


Organizers

Program Chairs

Keke Gai, Beijing Institute of Technology, China
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
Debiao He, Wuhan University, China
Sheng Wen, Swinburne University of Technology, Australia


Technical Program Committee

Yonghao Wang, Birmingham City University, UK
Ding Wang, Peking University, China
Tianwei Zhang, Amazon, USA
John Grant, Nine Tiles Cambridge, UK
Ralph Deters, University of Saskatchewan, Canada
Cheng Zhang, Waseda University, Japan
Paul Kearney, Birmingham City University, UK
Mak Sharma, Birmingham City University, UK
Zengpeng Li, Lancaster University, UK
Zijian Zhang, Beijing Institute of Technology, China
Xiaoyang Liu, Columbia University, USA
Shaojing Fu, National University of Defense Technology, China
Jian Shen, Nanjing University of Information Science and Technology, China
Hao Wang, Shandong Normal University, China
Junwei Zhang, Xidian University, China
Xinghua Li, Xidian University, China
Vitor Jesus, Birmingham City University, UK
Shuo Wang, Birmingham City University, UK
Hao Tang, City University of New York, USA
Xiong Li, Hunan University of Science and Technology, China
Shishank Shishank, Birmingham City University, UK
Yunxia Liu, Zhengzhou Normal University,China
Qi Jiang, Xidian University, China
Wenbo Shi, Northeastern University, China
Ning Lu, Northeastern University, China
Han Qiu, Telecom-ParisTech, France
Hua Yin, Duke University, USA
Ke Miao, Mitacs Inc., Canada
Md Liakat Ali, Rider University, USA
Ruoyu Chen, Beijing Information Science and Technology University, China
Wei Cai, The Chinese University of Hong Kong, Shenzhen, China