Taj Mahal - one of the world's seven wonders Galgotias College of Engg & Tech., Greater Noida Delhi - City of the cities in India

Instructions for Authors of Accepted Papers

Please revise your paper carefully according to the comments of the reviewers. Papers must be formatted according to the guidelines of Springer Communications in Computer and Information Science (CCIS) Series. Failure to do so may result in the exclusion of your paper from the proceedings. Please read the authors' instructions carefully before preparing your papers.

Each paper is allowed to have 15 pages in the final camera-ready copy. However extra page charges will be applicable for papers exceeding 9 pages.

Before uploading your camera ready paper, please:

  • Check that title and abstract in EDAS match your camera-ready paper exactly.

  • Use only Title Case for the paper title, i.e. capitalising all main words.

  • Do not use academic titles such as Dr., Professor, HoD, Director etc...in your final paper.

  • Compare all author names in EDAS with the author list in your paper. They MUST BE identical and in the same order.This is very important because we will be using the information provided in EDAS to generate the final conference program and the table of contents for Springer Proceedings.

  • The abstract and title should be readable stand-alone and not contain any references or unexplained acronyms.

  • You are allowed to modify abstract and author list yourself. You cannot modify the title for the paper, please send a mail to sscc2014.icacci@gmail.com if that is necessary and give a valid reason.

Important Steps


1.Complete your registration.

The instructions for completing your registration are posted at http://icacci-conference.org/sscc2014/registration.html

2. Login to EDAS and choose your paper.


3. Enter Registration Code Printed on the Receipt.

4. Upload your Camera ready paper (Final Manuscript) in PDF format on EDAS.

5. Upload the source files of your camera ready paper (WORD or Latex) on EDAS. All Latex files should be submitted as a single zipped file.


The camera ready paper should be formatted according to the Springer template. This template can be downloaded here:

6. Submit the copyright form in PDF or image formats from the "Copyright" column in the My papers table or the individual paper page of EDAS.
Each contribution must be accompanied by a Springer copyright form. One author may sign on behalf of all of the authors of a particular paper. In this case, the author signs for and accepts responsibility for releasing the material on behalf of any and all co-authors.

Download Copyright Form

Please make sure that you have entered the following details in the copyright form:

  • Title of the Book/Volume/Conference: International Symposium on Security in Computing and Communications (SSCC’14)
  • Volume Editors: Jaime Lloret Mauri, S M Thampi, Di Jin, and Danda B. Rawat
  • Title of Contribution: (Your Paper Title)
  • Author(s) name(s):
  • Corresponding Author's name, address, affiliation and e-mail:
  • Signature of Corresponding Author:
  • Call for Papers


    Call for Papers

    The program committee solicits previously unpublished papers offering novel research contributions in any aspect of security in computing and communications. Papers without a clear application to security, however, will be considered out of scope and may be rejected without full review. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection.

    Authors should submit their papers online. We use EDAS system for managing submissions and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here. Submissions must be in Portable Document Format (.pdf). All submissions should be written in English with a maximum paper length of FIFTEEN (15). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Please compare all author names in EDAS with the author list in your paper. They must be identical and in the same order.

    SSCC-2014 accepts regular and work-in-progress papers. Regular papers should present novel perspectives within the general scope of the conference. Short papers (Work-in-Progress) are an opportunity to present preliminary or interim results.

    Manuscript Template - Word Latex

    The topics of interests include, but are not limited to:

    Anti-Forensics Techniques
    Application Security
    Authentication and Access Control Systems
    Critical Infrastructure Protection
    Cyber Warfare Trends and Approaches
    Denial-of-Service Attacks and Countermeasures
    Digital Forensics
    Digital Rights Management
    Distributed and Pervasive Systems Security
    Embedded Systems Security
    Enterprise Systems Security
    Executable Content and Content Filtering
    File and Files System Security
    Fraud Management
    Hardware Security
    Human-Computer Interaction and Security
    Identity Management
    Intellectual Property Protection
    Key Distribution and Management
    Mobile System Security
    Multimedia and Document Security
    Network Infrastructure Security
    Operating Systems and Database Security
    Peer-to-Peer Security
    Secure Communications and Information Flow
    Secure Sensor Networks
    Security for Grid Computing
    Security in Cloud Computing/Social Networks
    Security in e-services
    Security of Web-Based Applications
    Surveillance Systems
    VOIP, Wireless Network Security
    Accountability
    Analysis of Network and Security Protocols
    Anonymity
    Authorship Analysis
    Biometrics Standards and Standardization
    Border Security
    Business Continuity & Disaster Recovery Planning
    Crowd Management
    Emergency Response and Management
    Encryption and Cryptography
    Forecasting Terrorism
    Incident Handling and Penetration Testing
    Information Hiding
    Intrusion and Anomaly Detection and Prevention
    Investigation of Insider Attacks
    Language-Based Security
    Malware Forensics and Anti-Malware Techniques
    Protocol Security
    Secure Software Development
    Security Architectures
    Security Metrics
    Self-Protecting and Self-Healing Systems
    Social Engineering
    Social Network Analysis
    Template Protection and Liveliness Detection
    Threats, Vulnerabilities, and Risk Management
    Economics of Security
    Laws and Regulations/Legal Issues
    Security Policies and Trust Management
    Security Education and Training
    New Threats and Non-Traditional Approaches
    Theories, Methods and Tools in Managing Security

    The organizers regard plagiarism as a serious professional misconduct. All submissions will be screened for plagiarism and when identified, the submissions by the same author will be rejected.

    Submitted papers will undergo a peer review process, coordinated by the Program Committee. Each manuscript will be reviewed by a minimum of three reviewers. Acceptance of papers will be communicated to authors by email. The accepted regular and work-in-progress papers will be published in the conference proceedings.

    To be published in the SSCC-2014 Conference Proceedings, an author of an accepted paper is required to register for the conference at the full rate. Both regular and work-in-progress papers will be scheduled for oral presentation. A submission SHOULD NOT be intended to get reviews from the Program Committee for the sole purpose of improving on the quality of the paper. A submission implies that the author intends to ultimately register the paper upon a favorable response from the conference organizers. The conference doesn’t encourage withdrawals after the paper is accepted

    The symposium proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. Authors publishing in CCIS have to sign the Springer CCIS copyright transfer form, however, they are free to use their material published in CCIS for substantially changed, more elaborate subsequent publications elsewhere. For the preparation of the camera-ready papers/files, authors have to strictly adhere to the Springer CCIS Authors' Instructions.

    Journal Special Issues

    Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):

    Important Dates

    Full Paper Submission Ends May 15, 2014 (Firm)
    Acceptance Notification June 18, 2014
    Final Paper Deadline July 16, 2014
    Author Registration Closes July 15, 2014


    Contact Us

    Email: sscc2014.icacci@gmail.com



    Hosted By