The 2nd ACM International Symposium on Blockchain and
Secure Critical Infrastructure (BSCI 2020)

will be held in conjunction with The 15th ACM ASIA Conference on Information, Computer
and Communications Security (ACM ASIACCS 2020)
October 5, 2020, Taipei.


IMPORTANT:
Due to the postponement of ASIACCS 2020, the conference date has been rescheduled to October 5, 2020.
The submission phase is reopened accordingly (see important dates).

Important Dates

Submissions Due
January 30, 2020
Due to a large volume of requests, the submission deadline was extended to February 13, 2020.
Duo to the postponement of ASIACCS 2020, the submission phase is reopened and the deadline is rescheduled to April 15, 2020.
Notification
February 16, 2020
February 25, 2020 (Extended)
June 1, 2020 (rescheduled)
Camera-ready Due
July 22, 2020
Conference Date
June 1- June 5, 2020
October 5, 2020 (rescheduled)

Call for Papers  

Blockchain is a decentralized transaction and data management technology that was voiced by its implementation in Bitcoin. In recent years, Blockchain has been achieving an ever-growing popularity. The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third-party organization in control of the transactions, and therefore it is applied in numerous fields, including securing critical infrastructure.

As technology advanced, critical infrastructures increasingly come to rely on digital control systems and networking. Attacks on critical infrastructure sites are currently a fact of life rather than a potential threat. For example, power stations, chemical plants, telecommunication stations and nuclear facilities are tempting targets to cyber-attacks.

In this scene, the question remains on why and how we can utilize blockchain techniques to secure critical infrastructure. Prior methods of protecting critical infrastructure have been plagued by centralized weaknesses and single points of failure problems. Contemporarily, Blockchain can offer cryptography for transactions and data in trustless distributed networks to enhance the reliability and resilience of the critical infrastructure. In other words, increasingly open and security needs is forcing us to shore up defenses with developing blockchain technology to help secure distributed critical infrastructure.

The aim of this academic get-together, ACM International Symposium on Blockchain and Secure Critical Infrastructure, is to collect latest research results concerning Blockchain and secure critical infrastructure on relevant scenarios, such as the ones subsequently listed. Researchers, experts, and scholars from both industry and academia are encouraged to share their recent studies, investigations, and findings in this forum.

Topics of particular interest include, but are not limited to:

In addition to the technical research achievements, all qualified submissions in relevant subtopics (including novel industrial topics) not mentioned here are welcomed, too. Nevertheless, articles focusing on describing standards or commercial purposes are not considered as acceptable contents for this symposium. High quality submissions will be recommended to a few journal special issues that are currently being applied for.

Submission Instructions

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized and a DOUBLE-BLIND REVIEW policy will be applied during the review process. Submissions must be in double-column ACM SIG Proceedings format, and should not exceed the following page limit.

Position papers describing the work in progress are also welcome. Only pdf files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of the paper must be registered at the appropriate conference rate. Accepted papers will be published in the ACM Digital Library. This symposium will grant a few awards, including ACM Best Paper Award and ACM Best Student Award.

Paper submission site: https://easychair.org/conferences/?conf=bsci2020.

Keynote Speaker

Prof. Kui Ren's work on cloud security, Internet of things security and wireless security have made significant impact. He is the director of Institute of Cyberspace Research of Zhejiang University, IEEE Fellow, ACM Distinguished Member. He chaired and participated in projects from NSFC, NSF, US Department of Energy and Air Force Research Laboratory which cost more than $10 million. He was awarded Achievement Award of IEEE ComSoc, Sustained Achievement Award of exceptional scholar program of Suny Buffalo, and NSF youth Achievement Award. Prof. Kui Ren is internationally recognized for accomplishments in the areas of cloud security and wireless security. He has made many fundamental innovations in both theory and practice from the discipline to the society. His works have significant impact on emerging cloud systems and wireless network technologies. Prof. Kui Ren has published more than 200 papers, and cited more than 20 thousand times. His research results have been widely reported by Xinhua news agency, Scientific American, NSF news, ACM news and other media.

Organizers

Program Chairs

Keke Gai, Beijing Institute of Technology, China
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
Jiamou Liu, The University of Auckland, New Zealand

Technical Program Committee

Yonghao Wang, Birmingham City University, UK
Ding Wang, Peking University, China
Tianwei Zhang, Amazon, USA
Xuyun Zhang, Macquarie University, Australia
John Grant, Nine Tiles Cambridge, UK
Ralph Deters, University of Saskatchewan, Canada
Cheng Zhang, Waseda University, Japan
Paul Kearney, Birmingham City University, UK
Mak Sharma, Birmingham City University, UK
Zengpeng Li, Lancaster University, UK
Zijian Zhang, Beijing Institute of Technology, China
Xiaoyang Liu, Columbia University, USA
Shaojing Fu, National University of Defense Technology, China
Jian Shen, Nanjing University of Information Science and Technology, China
Hao Wang, Shandong Normal University, China
Junwei Zhang, Xidian University, China
Xinghua Li, Xidian University, China
Vitor Jesus, Birmingham City University, UK
Shuo Wang, Birmingham City University, UK
Hao Tang, City University of New York, USA
Xiong Li, Hunan University of Science and Technology, China
Shishank Shishank, Birmingham City University, UK
Yunxia Liu, Zhengzhou Normal University,China
Qi Jiang, Xidian University, China
Wenbo Shi, Northeastern University, China
Ning Lu, Northeastern University, China
Han Qiu, Telecom-ParisTech, France
Hua Yin, Duke University, USA
Ke Miao, Mitacs Inc., Canada
Md Liakat Ali, Rider University, USA
Ruoyu Chen, Beijing Information Science and Technology University, China
Wei Cai, The Chinese University of Hong Kong, Shenzhen, China
Abdelaziz Bouras, Professor, Qatar University, Qatar
Wu Chen, Southwest University, China