MENU
Welcome

The 14th IEEE International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (IEEE SpaCCS 2021)

The IEEE SpaCCS 2021 conference is the 14th event in the series of conferences which are devoted to security, privacy and anonymity in computation, communication and storage. SpaCCS is now recognized as the main regular event of the world that is covering many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. As applications of computer systems and networks have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The conference will provide a forum for the world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.

Following the traditions of previous successful SpaCCS conferences,held in Nanjing, China (2020), Altanta, USA (2019), Melbourne, Australia (2018), Guangzhou, China (2017), Zhangjiajie, China (2016), Helsinki, Finland (2015), Beijing, China (2014), Melbourne, Australia (2013), Liverpool, UK (2012), and Changsha, China (2011). The conference aims at bringing together researchers and practitioners in the world working in the research fields of computation, communication and storage, with regard to security, privacy, and anonymity aspects of computer systems and networks. SpaCCS will focus on three broad areas of computation, communication, and storage, i.e. architectures, algorithms, techniques, and applications for security, privacy and anonymity.

Prospective authors are invited to submit their papers to IEEE SpaCCS 2021. The authors of selected best papers will be invited post conference to extend their contributions for special issues of prestigious journals to be planned in conjunction with the conference.

Call for Papers

Topics of particular interest include, but are not limited to:

Track 1: Security on Computation, Communication, and Storage

  • Security Model and Architecture
  • Software and System Security
  • Secure Computation
  • Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
  • Artificial Intelligence
  • Secure Network Computing
  • Risk Analysis and Management
  • Network Security
  • Malware and Botnets
  • Intrusion Detection
  • Security in Web Services
  • Security in Mobile Social Networks
  • Security in Mobile and Wireless Communications
  • Fraud and Cyber
  • Crime
  • Accounting and Auditing
  • Applied Cryptography
  • Database Security
  • Authentication
  • Computer forensics
  • Digital Content Protection and Digital Forensics
  • Information Hiding
  • Security in Big Data and its Applications

Track 2: Privacy on Computation, Communication, and Storage

  • Measuring and Quantifying Privacy
  • Privacy Modeling and Analysis
  • Software and System Privacy
  • Privacy preserving Computing
  • Differential Privacy
  • Blockchain
  • Building and Deploying Privacy enhancing Systems
  • Reliability, Robustness, and Abuse Prevention in Privacy Systems
  • Privacy in Web Services
  • Privacy in Cloud and Big Data Applications
  • Privacy in Social Networks and Microblogging Systems
  • Privacyenhanced Access Control, Authentication, and Identity Management
  • Data Protection Technologies
  • Privacy in Big Data and its Applications
  • Policy Languages and Tools for Privacy
  • Privacy and Human Rights
  • Interdisciplinary Research Connecting Privacy to Other Fields
  • Privacy in Cloud Computing and Pervasive/Ubiquitous Computing
  • Information Leakage, Data Correlation and Generic Attacks to Privacy
  • Preserving Data Mining, Data Release and Publishing

Track 3: Anonymity on Computation, Communication, and Storage

  • Anonymous Data Mining and Data Sharing
  • Parallelism Exploitation Techniques for Anonymity
  • Anonymity in Big Data Analytics
  • Anonymous Management in Trust Relationships
  • Anonymous Video Analytics Technology
  • Anonymity Metrics, Measures and Evaluations
  • Anonymity Models, Hardware/Device of Anonymity
  • Anonymity in Wireless Communication Systems
  • Anonymous Communication Protocols
  • Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
  • Anonymous Proxy Software
  • Anonymous Communication and Internet
  • Anonymous Social Networks, Structural k-Anonymity in Social Networks
  • Authentication Protocol Providing User Anonymity
  • Anonymous Information Storage and Management
  • Private and Anonymous Data Storage
  • Anonymity, Pseudonymity & Identity Management
  • Anonymity in Big Data and Cloud Scenarios
  • Anonymity in Health and Medical Databases

Submission

Submissions should include abstract, 5-10 keywords, and the e-mail address of the corresponding author and be in PDF format. Each submission should be in the 8.5 x 11 inches two-column format with 10-12 point font (Template: DOC or LaTeX), including tables, figures, and references.

Please submit via Submission Link. For more page length information, please click here

Organization Committees

    General Chair
  • Sun-Yuan Kung, Princeton University, USA
  • Gerard Memmi, Telecom Paris, France
  • Meikang Qiu, Texas A&M University Commerce, USA
    Program Chair
  • M. Shamim Hossain, King Saud University
  • Baijian Yang, Purdue University, USA
  • Han Qiu, Tsinghua University, China
    Steering Committees
  • Guojun Wang, Guangzhou University, China (Chair)
  • Gregorio Martinez, University of Murcia, Spain (Chair)
  • Jinjun Chen, Swinburne University of Technology, Australia
  • Weijia Jia, University of Macau, Macau
  • Ryan Ko, Queensland University, Australia
  • Constantinos Kolias, University of Idaho, USA
  • Jianbin Li, North China Electric Power University, China
  • Jie Li, Shanghai Jiao Tong University, China
  • Yang Xiang, Swinburne University of Technology, Australia
  • Zheng Yan, Aalto University, Finland/Xidian University, China
  • Wanlei Zhou, University of Technology Sydney, Australia
  • Mario Freire, The University of Beira Interior, Portuga
  • Minyi Guo, Shanghai Jiao Tong University, China
  • Wei Jie, University of West London, UK
  • Georgios Kambourakis, University of the Aegean, Greece
  • Jianhua Ma, Hosei University, Japan
  • Felix Gomez Marmol, University of Murcia, Spain
  • Geyong Min, University of Exeter, UK
  • Peter Mueller, IBM Zurich Research Laboratory, Switzerland
  • Indrakshi Ray, Colorado State University, USA
  • Kouichi Sakurai, Kyushu University, Japan
  • Juan E. Tapiador, The University Carlos III of Madrid, Spain
  • Sabu M. Thampi, Indian Institute of Information Technology and Management, India
  • Jie Wu, Temple University, USA
  • Yang Xiang, Swinburne University of Technology, Australia
  • Laurence T. Yang, St. Francis Xavier University, Canada
    Technical Program Committee
  • Luca Davoli, University of Parma, Italy
  • Wei Jie, University of West London, UK
  • Georgios Kambourakis, University of the Aegean, Greece
  • Jianhua Ma, Hosei University, Japan
  • Hao Hu, Nanjing University, China
  • Sang-Yoon Chang, Advanced digital sciences center, Singapore
  • C.L. Wang, The University of Hong Kong, China
  • Weigang Li, University of Brasilia, Brazil
  • Kan Zhang, Tsinghua University, China
  • Felix Gomez Marmol, University of Murcia, Spain
  • Geyong Min, University of Exeter, UK
  • Peter Mueller, IBM Zurich Research Laboratory, Switzerland
  • Indrakshi Ray, Colorado State University, USA
  • Dean Anderso, Bank of America Merrill Lynch, USA
  • Yongxin Zhu, Shanghai Jiaotong University, China
  • Han Qiu, Telecom Paris, France
  • Junjie Peng, Shanghai University, China
  • Denis Trystram, Grenoble university, France
  • Sabu M. Thampi, Indian Institute of Information Technology and Management, India
  • Wenbo Zhu, Google Inc. USA
  • Fuji Ren, The University of Tokushima, Japan
  • Kouichi Sakurai, Kyushu University, Japan
  • Juan E. Tapiador, The University Carlos III of Madrid, Spain

Workshops

The workshops with IEEE SpaCCS:

The 12th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2021).

The 7th International Symposium on Sensor-Cloud Systems (SCS 2021).

The 11th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2021).

The 10th International Symposium on Security and Privacy on the Internet of Things (SPIoT 2021).

 

 

 

 

 

 

 

 

sponsor  sponsor  sponsor  sponsor  venue sponsor