Accepted Papers

Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control
Heyi Tang (Tsinghua University)
Yong Cui (Tsinghua University)
Chaowen Guan (The State University of New York at Buffalo)
Jianping Wu (Tsinghua University)
Jian Weng (Jinan University)
Kui Ren (The State University of New York at Buffalo)
Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
Chen Wang (Stevens Institute of Technology)
Xiaonan Guo (Stevens Institute of Technology)
Yan Wang (Binghamton University)
Yingying Chen (Stevens Institute of Technology)
Bo Liu (Stevens Institute of Technology)
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext
Willy Susilo (University of Wollongong)
Rongmao Chen (University of Wollongong)
Fuchun Guo (University of Wollongong)
Guomin Yang (University of Wollongong)
Yi Mu (University of Wollongong)
Yang-Wai Chow (University of Wollongong)
Dealerless Corporate Key Generation for Identity-Based Encryption Schemes
Zhen Liu (Security and Data Sciences, ASTRI)
Duncan Wong (atCipher Inc Limited)
Jack Poon (atCipher Inc Limited)
ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis
Qian Feng (Syracuse University)
Aravind Prakash (Binghamton University)
Minghua Wang (University of Chinese Academy of Sciences)
Curtis Carmony (Syracuse University)
Heng Yin (Syracuse University)
Hardening OpenStack Cloud Platforms against Compute Node Compromises
Wai Kit Sze (Stony Brook University)
Abhinav Srivastava (AT&T Labs Research)
R. Sekar (Stony Brook University)
Building an Encrypted, Distributed, and Searchable Key-value Store
Xingliang Yuan (City University of Hong Kong)
Xinyu Wang (City University of Hong Kong)
Cong Wang (City University of Hong Kong)
Chen Qian (University of Kentucky)
Jianxiong Lin (City University of Hong Kong)
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
Peng Xu (Huazhong University of Science and Technology)
Jingnan Li (Huazhong University of Science and Technology)
Wei Wang (Huazhong University of Science and Technology)
Hai Jin (Huazhong University of Science and Technology)
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication
Yanjiang Yang (Huawei Singapore Research Center)
Haibing Lu (Santa Clara University)
Joseph Liu (Monash University)
Jian Weng (Jinan University)
Youcheng Zhang (Nanjing Unary Information Technology Co., Ltd)
Jianying Zhou (Institute for infocomm research)
Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant
Aditya Mathur (Singapore University of Technology and Design)
Sridhar Adepu (Singapore University of Technology and Design)
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools
Guozhu Meng (Nanyang Technological University)
Yinxing Xue (Nanyang Technological University)
Chandramohan Mahinthan (Nanyang Technological University)
Annamalai Narayanan (Nanyang Technological University)
Yang Liu (Nanyang Technological University)
Jie Zhang (Nanyang Technological University)
Tieming Chen (Zhejiang University Of Technology)
Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds
Sagar Sharma (Wright State University)
James Powers (Wright State University)
Keke Chen (Wright State University)
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation
Kai Zhang (East China Normal University)
Junqing Gong (Shanghai Jiao Tong University)
Shaohua Tang (South China University of Technology)
Jie Chen (East China Normal University)
Xiangxue Li (East China Normal University)
Haifeng Qian (East China Normal University)
Zhenfu Cao (East China Normal University)
A General Construction of Homomorphic Linear Authentication Schemes from \epsilon-Authentication Codes
Shuai Han (Shanghai Jiao Tong University)
Shengli Liu (Shanghai Jiao Tong University)
Fangguo Zhang (Sun Yat-sen University)
Kefei Chen (Hangzhou Normal University)
StormDroid: A Streaminglized Machine Learning-based System for Detecting Android Malware
Sen Chen (East China Normal University)
Minhui Xue (East China Normal University/NYU Shanghai)
Zhushou Tang (Shanghai Jiao Tong University/Pangu Lab)
Lihua Xu (East China Normal University)
Haojin Zhu (Shanghai Jiao Tong University)
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud
Qian Wang (Wuhan University)
Jingjun Wang (Wuhan University)
Shengshan Hu (Wuhan University)
Qin Zou (Wuhan University)
Kui Ren (The State University of New York at Buffalo)
Efficient Secure Outsourcing of Quadratic Programs
Sergio Salinas (Wichita State University)
Changqing Luo (Case Western Reserve University)
Weixian Liao (Case Western Reserve University)
Pan Li (Case Western Reserve University)
Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement
Hyungjoon Koo (Stony Brook University)
Michalis Polychronakis (Stony Brook University)
Bilateral-secure Signature by Key Evolving
Tao Xiang (Chongqing University)
Xiaoguo Li (Chongqing University)
Fei Chen (Shenzhen University)
Yi Mu (University of Wollongong)
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data
Kaitai Liang (Aalto University)
Chunhua Su (Japan Advanced Institute of Science and Technology)
Jiageng Chen (Central China Normal University)
Joseph K Liu (Monash University)
Congesting the Internet with Coordinated And Decentralized Pulsating Attacks
Yu-Ming Ke (National Taiwan University)
Chih-Wei Chen (National Taiwan University)
Hsu-Chun Hsiao (National Taiwan University)
Adrian Perrig (ETH Zürich)
Vyas Sekar (Carnegie Mellon University)
Cross Processor Cache Attacks
Gorka Irazoqui (Worcester Polytechnic Institute)
Thomas Eisenbarth (Worcester Polytechnic Institute)
Berk Sunar (Worcester Polytechnic Institute)
Leakage Fingerprints — A Non-negligible Vulnerability in Side-Channel Analysis
Zeyi Liu (Chinese Academy of Sciences)
Neng Gao (Chinese Academy of Sciences)
Chenyang Tu (Chinese Academy of Sciences)
Jian Zhou (Chinese Academy of Sciences)
Yuan Ma (Chinese Academy of Sciences)
Yuan Zhao (Chinese Academy of Sciences)
Password-Controlled Encryption with Accountable Break-Glass Access
Tao Zhang (The Chinese University of Hong Kong)
Sherman S. M. Chow (The Chinese University of Hong Kong)
Jinyuan Sun (University of Tennessee, Knoxville)
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System
Cheng Huang (Nanyang Technological University)
Rongxing Lu (Nanyang Technological University)
Hui Zhu (Xidian University)
Jun Shao (Zhejiang Gongshang University)
Xiaodong Lin (University of Ontario Institute of Technology)
Anonymous Role-Based Access Control on E-Health Records
Xingguang Zhou (Beihang University)
Jianwei Liu (Beihang University)
Weiran Liu (Beihang University)
Qianhong Wu (Beihang University)
UC-secure Two-Server Password-Based Authentication Protocol and Its Applications
Lin Zhang (Chinese Academy of Science)
Zhenfeng Zhang (Chinese Academy of Science)
Xuexian Hu (State Key Laboratory of Mathematical Engineering and Advanced Computing/Chinese Academy of Science)
MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing
Phani Vadrevu (University of Georgia)
Roberto Perdisci (University of Georgia)
Model-based Security Testing: an Empirical Study on OAuth 2.0 Implementations
Ronghai Yang (The Chinese University of Hong Kong)
Guanchen Li (The Chinese University of Hong Kong)
Wing Cheong Lau (The Chinese University of Hong Kong)
Kehuan Zhang (The Chinese University of Hong Kong)
Pili Hu (The Chinese University of Hong Kong)
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
Sungwook Kim (Security Lab., Software R&D Center, Samsung Electronics)
Jinsu Kim (Security Lab., Software R&D Center, Samsung Electronics)
Dongyoung Koo (Department of Computer Science, Korea Advanced Institute of Science and Technology)
Yuna Kim (Frontier CS Lab., Software R&D Center, Samsung Electronics)
Hyunsoo Yoon (Department of Computer Science, Korea Advanced Institute of Science and Technology)
Junbum Shin (Security Lab., Software R&D Center, Samsung Electronics)
Client-CASH: Protecting Master Passwords against Offline Attacks
Jeremiah Blocki (Microsoft Research)
Anirudh Sridhar (Carnegie Mellon University)
Discovering Malicious Domains through Passive DNS Data Graph Analysis
Issa M. Khalil (Qatar Computing Research Institute)
Ting Yu (Qatar Computing Research Institute)
Bei Guan (Qatar Computing Research Institute)
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications
Seyed Hossein Ahmadinejad (Nulli)
Philip W. L. Fong (University of Calgary)
Rei Safavi-Naini (University of Calgary)
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
Kai He (Jinan University)
Jian Weng (Jinan University)
Jia-Nan Liu (Jinan University)
Joseph Liu (Monash University)
Wei Liu (Jinan University)
Robert H. Deng (Singapore Management University)
Device-Enhanced Password Protocols with Optimal Online-Offline Protection
Stanislaw Jarecki (University of California Irvine)
Hugo Krawczyk (IBM Research)
Maliheh Shirvanian (University of Alavama at Birmingham)
Nitesh Saxena (University of Alavama at Birmingham)
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability
Yanli Ren (Shanghai University)
Ning Ding (Shanghai Jiao Tong University)
Xinpeng Zhang (Shanghai University)
Haining Lu (Shanghai Jiao Tong University)
Dawu Gu (Shanghai Jiao Tong University)
NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer
Shijie Jia (Chinese Academy of Sciences)
Luning Xia (Chinese Academy of Sciences)
Bo Chen (The Pennsylvania State University)
Peng Liu (The Pennsylvania State University)
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms
Mathy Vanhoef (KU Leuven)
Célestin Matte (INSA-Lyon)
Mathieu Cunche (INSA-Lyon)
Leonardo Cardoso (INSA-Lyon)
Frank Piessens (KU Leuven)
Secure Dynamic SSE via Access Indistinguishable Storage
Tianhao Wang (Purdue University)
Yunlei Zhao (Fudan University)
Preventing Page Faults from Telling your Secrets
Shweta Shinde (National University of Singapore)
Zheng Leong Chua (National University of Singapore)
Viswesh Narayanan (National University of Singapore)
Prateek Saxena (National University of Singapore)
Smart Locks: Lessons for Securing Commodity Internet of Things Devices
Grant Ho (UC Berkeley)
Derek Leung (UC Berkeley)
Pratyush Mishra (UC Berkeley)
Ashkan Hosseini (UC Berkeley)
Dawn Song (UC Berkeley)
David Wagner (UC Berkeley)
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization
Gabriele Costa (DIBRIS - University of Genova)
Paolo Gasti (New York Institute of Technology)
Alessio Merlo (DIBRIS- University of Genoa)
Shung-Hsi Yu (New York Institute of Technology)
DroidDisintegrator: Intra-Application Information Flow Control in Android Apps
Roei Schuster (Tel Aviv University)
Eran Tromer (Tel Aviv University)
Half-Baked Cookies Hardening Cookie-Based Authentication for the Modern Web
Yogesh Mundada (Georgia Tech)
Nick Feamster (Princeton University)
Balachander Krishnamurthy (AT&T Labs Research)
MobiPot: Understanding Mobile Telephony Threats with Honeycards
Marco Balduzzi (Trend Micro Research)
Payas Gupta (New York University Abu Dhabi)
Lion Gu (Trend Micro Research)
Debin Gao (Singapore Management Universy)
Mustaque Ahamad (Georgia Institute of Technology and New York University Abu Dhabi)
No-Execute-After-Read: Preventing Code Disclosure in Commodity Software
Jan Werner (RENCI)
George Baltas (University of North Carolina at Chapel Hill)
Rob Dallara (University of North Carolina at Chapel Hill)
Nathan Otternes (University of North Carolina at Chapel Hill)
Kevin Snow (University of North Carolina at Chapel Hill)
Fabian Monrose (University of North Carolina at Chapel Hill)
Michalis Polychronakis (Stony Brook University)
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data
Ngoc Hieu Tran (Singapore Management University)
Hwee Hwa Pang (Singapore Management University)
Robert H. Deng (Singapore Management University)
Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS)
Qinghan Xue (Lehigh University)
Mooi Choo Chuah (Lehigh University)
Yingying Chen (Stevens Institute of Technology)
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks
Mariano Graziano (Cisco Systems, Inc.)
Davide Balzarotti (Eurecom)
Alain Zidouemba (Cisco Systems, Inc.)
Attestation Transparency: Building secure Internet services for legacy clients
Jethro Beekman (University of California, Berkeley)
John Manferdelli (Google)
David Wagner (University of California, Berkeley)
CDRep: Automatic Repair of Cryptographic-Misuses in Android Applications
Siqi Ma (Singapore Mangement University)
David Lo (Singapore Mangement University)
Teng Li (Xidian University)
Robert H. Deng (Singapore Mangement University)
Attacks and Defence on Android Free Floating Windows
Lingyun Ying (Chinese Academy of Sciences)
Yao Cheng (Singapore Management University)
Yemian Lu (Chinese Academy of Sciences)
Yacong Gu (Chinese Academy of Sciences)
Purui Su (Chinese Academy of Sciences)
Dengguo Feng (Chinese Academy of Sciences)
Practical "Signatures with Efficient Protocols" from Simple Assumptions
Benoît Libert (ENS de Lyon)
Fabrice Mouhartem (ENS de Lyon)
Thomas Peters (ENS, France & UCL, Belgium)
Moti Yung (Google & Columbia University)
Data Exfiltration in the Face of CSP
Steven Van Acker (Chalmers University of Technology)
Daniel Hausknecht (Chalmers University of Technology)
Andrei Sabelfeld (Chalmers University of Technology)
Automatic Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Andrei Costin (EURECOM)
Apostolis Zarras (Techical University of Munich)
Aurélien Francillon (EURECOM)
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure
Chong Guan (Chinese Academy of Sciences)
Kun Sun (College of William and Mary)
Zhan Wang (Amazon Web Services, Inc.)
Wen Tao Zhu (Chinese Academy of Sciences)
Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher
Changhai Ou (Chinese Academy of Sciences/University of Chinese Academy of Sciences)
Zhu Wang (Chinese Academy of Sciences)
Juan Ai (Chinese Academy of Sciences/University of Chinese Academy of Sciences)
Xinping Zhou (Chinese Academy of Sciences/University of Chinese Academy of Sciences)
Degang Sun (Chinese Academy of Sciences)
Victor Debrunner (Florida State University)
Anonymous Identification for Ad Hoc Group
Xingye Lu (The Hong Kong Polytechnic University)
Man Ho Au (The Hong Kong Polytechnic University)
Checking Intent-based Communication in Android with Intent Space Analysis
Yiming Jing (Samsung Research America)
Gail-Joon Ahn (Arizona State University)
Adam Doupé (Arizona State University)
Jeong Hyun Yi (Soongsil University)
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms
Anindya Maiti (Wichita State University)
Oscar Armbruster (Wichita State University)
Murtuza Jadliwala (Wichita State University)
Jibo He (Wichita State University)
Efficient Authenticated Multi-Pattern Matching
Zhe Zhou (The Chinese University of Hong Kong)
Tao Zhang (The Chinese University of Hong Kong)
Sherman S.M. Chow (The Chinese University of Hong Kong)
Yupeng Zhang (University of Maryland, College Park)
Kehuan Zhang (The Chinese University of Hong Kong)
Fault Attacks on Efficient Pairing Implementation
Chen Qian (Ecole normale supérieure de Rennes, France)
Pierre-Alain Fouque (Université de Rennes, IRISA and Institut Universitaire de France)
Forgery-Resistant Touch-based Authentication on Mobile Devices
Neil Zhenqiang Gong (Iowa State University)
Mathias Payer (Purdue University)
Reza Moazzezi (UC Berkeley)
Mario Frank (UC Berkeley)
Gait-Based Wi-Fi Signatures for Privacy-Preserving
Ting Zhu (UMBC)
Efficient Techniques for Publicly Verifiable Delegation of Computation
Kaoutar Elkhiyaoui (EURECOM)
Melek Önen (EURECOM)
Monir Azraoui (EURECOM)
Refik Molva (EURECOM)
Identifying and Utilizing Dependencies Across Cloud Security Services
Ahmed Taha (Technical University of Darmstadt)
Patrick Metzler (Technical University of Darmstadt)
Ruben Trapero (Technical University of Darmstadt)
Jesus Luna (Technical University of Darmstadt)
Neeraj Suri (Technical University of Darmstadt)
StemJail: Dynamic Role Compartmentalization
Mickaël Salaün (ANSSI)
Marion Daubignard (ANSSI)
Hervé Debar (Télécom SudParis)
SkypeLine Robust Hidden Data Transmission for VoIP
Katharina Kohls (Ruhr-University Bochum)
Thorsten Holz (Ruhr-University Bochum)
Dorothea Kolossa (Ruhr-University Bochum)
Christina Pöpper (Ruhr-University Bochum/NYU Abu Dhabi)
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps
Zheran Fang (Fudan University)
Weili Han (Fudan University)
Dong Li (Fudan University)
Zeqing Guo (Fudan University)
Danhao Guo (Fudan University)
Xiaoyang Sean Wang (Fudan University)
Zhiyun Qian (University of California Riverside)
Hao Chen (ShanghaiTech University)
Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding
Binanda Sengupta (Indian Statistical Institute)
Sushmita Ruj (Indian Statistical Institute)
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
Ding Wang (Peking University)
Qianchen Gu (Peking University)
Haibo Cheng (Peking University)
Ping Wang (Peking University)
Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition
Ian Markwood (University of South Florida)
Yao Liu (University of South Florida)
Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining
Babak Rahbarinia (Auburn University Montgomery)
Marco Balduzzi (Trend Micro Research)
Roberto Perdisci (University of Georgia/Georgia Institute of Technology)

Short Papers

Generic Construction of Publicly Veriable Predicate Encryption
Chuting Tan (Harbin Institute of Technology Shenzhen Graduate School)
Zoe L Jiang (Harbin Institute of Technology Shenzhen Graduate School)
S.M Yiu (The University of Hong Kong)
Junbin Fang (Jinan University)
Xuan Wang (Harbin Institute of Technology Shenzhen Graduate School)
Ye Li (Harbin Institute of Technology Shenzhen Graduate School)
Zechao Liu (Harbin Institute of Technology Shenzhen Graduate School)
Xiaoyan Liu (Harbin Institute of Technology Shenzhen Graduate School)
Lei Cui (Harbin Institute of Technology Shenzhen Graduate School)
Yabin Jin (Harbin Institute of Technology Shenzhen Graduate School)
Jin Li (Guangzhou University)
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family
Jing Li (Beijing University of Posts and Telecommunications)
Licheng Wang (Beijing University of Posts and Telecommunications)
Zonghua Zhang (Institut Mines-Telecom/TELECOM Lille)
Xinxin Niu (Beijing University of Posts and Telecommunications)
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption
Shi-Feng Sun (Shanghai Jiao Tong University/The University of Melbourne)
Dawu Gu (Shanghai Jiao Tong University)
Joseph Liu (Monash University)
Udaya Parampalli (The University of Melbourne)
Tsz Hon Yuen (Huawei Singapore)
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus
Fuyang Fang (University of Chinese Academy of Sciences/Chinese Academy of Sciences)
Bao Li (Chinese Academy of Sciences)
Xianhui Lu (Chinese Academy of Sciences)
Yamin Liu (Chinese Academy of Sciences)
Dingding Jia (Chinese Academy of Sciences)
Haiyang Xue (Chinese Academy of Sciences)
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds
Peng Xu (Huazhong University of Science and Technology)
Jun Xu (Huazhong University of Science and Technology)
Wei Wang (Huazhong University of Science and Technology)
Hai Jin (Huazhong University of Science and Technology)
Willy Susilo (University of Wollongong)
Deqing Zou (Huazhong University of Science and Technology)
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
Johannes Götzfried (FAU Erlangen-Nuremberg)
Tilo Müller (FAU Erlangen-Nuremberg)
Gabor Drescher (FAU Erlangen-Nuremberg)
Stefan Nürnberger (CISPA, Saarland University)
Michael Backes (MPI-SWS)
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected
Issa Khalil (Qatar Computing Research Institute, Hamad Bin Khalifa University)
Zuochao Dou (New Jersey Institute of Technology)
Abdallah Khreishah (New Jersey Institute of Technology)
Inside Attack Filtering for Robust Sensor Localization
Jongho Won (Purdue University)
Elisa Bertino (Purdue University)

In case of any query on the accepted papers, please contact Program Chair Xinyi Huang. For all queries regarding publication, please contact Publication Chair Kaitai Liang.

Call For Papers

We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2016 include, but are not limited to:

  • Access control
  • Applied cryptography
  • Authentication
  • Cloud computing security
  • Cyber-physical security
  • Data and application security
  • Digital forensics
  • Embedded systems security
  • Formal methods for security
  • Hardware-based security
  • Intrusion detection
  • Key management
  • Malware and botnets
  • Mobile computing security
  • Network security
  • Operating system security
  • Privacy-enhancing technology
  • Security architectures
  • Security metrics
  • Software security
  • Smart grid security
  • Threat modeling
  • Trusted computing
  • Usable security and privacy
  • Web security
  • Wireless security

Instructions for authors

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions must be in double-column ACM SIG Proceedings format (, and should not exceed 12 pages + 3 pages (for appendix). Only pdf files will be accepted.

Authors of accepted papers must guarantee that their papers will be presented at the conference. At least one author of the paper must be registered at the appropriate full conference rate. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library. There will be a best paper award.

Paper submission has been closed.

ASIACCS2016 Paper Submission

ACM SIG Proceedings Templates

Please find the instructions for preparing the camera-ready final version of papers for the main conference and workshops through the following link.

Camera Ready Paper Instructions