CANS: Cryptology and Network Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2020 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
CANS 2019 Cryptology and Network Security
Oct 25, 2019 - Oct 27, 2019 Fuzhou, China May 6, 2019
CANS 2018 17th International Conference on Cryptology and Network Security
Sep 30, 2018 - Oct 3, 2018 Naples, Italy May 17, 2018
CANS 2016 15th International Conference on Cryptology and Network Security
Nov 14, 2016 - Nov 16, 2016 Milan, Italy Jul 20, 2016
CANS 2014 13rd International Conference on Cryptology and Network Security
Oct 22, 2014 - Oct 24, 2014 Heraklion Crete, Greece Jun 20, 2014 (Jun 17, 2014)
CANS 2013 International Conference on Cryptology and Network Security
Nov 20, 2013 - Nov 22, 2013 Paraty, Brazil Jun 11, 2013
CANS 2012 11th International Conference on Cryptology and Network Security
Dec 12, 2012 - Dec 14, 2012 Darmstadt, Germany Jul 15, 2012
CANS 2010 The Ninth International Conference on Cryptology And Network Security (CANS 2010)
Dec 12, 2010 - Dec 14, 2010 Malaysia Jun 18, 2010
CANS 2009 The 8th International Conference on Cryptology and Network Security
Dec 12, 2009 - Dec 14, 2009 Kanazawa, Japan Jun 17, 2009
 
 

Present CFP : 2019

Important Dates
Paper Submission Due: 6 May 2019 UTC Extended to 3 June 2019, 23:59 UTC
Authors Notification: 8 July 2019 UTC Extended to 31 July 2019 UTCC
Camera ready due: 5 August 2019, 23:59 UTC Extended to 9 August 2019, 23:59 UTC
Conference Dates: 25-27 October 2019

The annual International Conference on Cryptology and Network Security (CANS) focuses on current advances in all aspects of cryptology, data protection, and network and computer security. The proceedings will be published in the Lecture Notes in Computer Science series by Springer.

Submission guidelines
High quality papers on unpublished research and implementation experiences are solicited for submission. All papers must be original and not substantially duplicate work that has been published at or is simultaneously submitted to a journal or another conference/workshop with proceedings. All submissions must be written in English, at most 20 pages in Springer's Lecture Notes in Computer Science (LNCS) Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. The introduction should summarise the contributions of the paper at the level understandable for a non-expert reader. The introduction should also explain the relation to related work. At most 4 pages of supplemental material may be provided as well-marked appendices, however, the paper should be intelligible without this material. Submissions must be anonymous (no author names, affiliations, acknowledgments, or obvious references). The conference will also consider short papers, that is, submissions of up to 8 pages (in the LNCS format), for results that are not yet fully fleshed out or that simply require few pages to describe but still make a significant contribution. All submissions must be processed with LaTeX2e according to the instructions given by Springer. Submitted manuscripts must be typeset in plain Springer LNCS format, in particular without changing the font size, margins or line spacing. Submissions not meeting these guidelines may be rejected without consideration of their merits. Papers must be submitted electronically in PDF format via easychair.

https://easychair.org/conferences/?conf=cans2019

Presentation and publication
At least one author of every accepted paper must register to the conference by the early registration deadline indicated by the organizers. Papers without a registered author will be removed from the proceedings. Authors have to present their own paper(s). Proceedings including all accepted papers will be published in LNCS and will be available at the conference.

Areas of interest
• Access Control
• Anonymity & Pseudonymity
• Applied Cryptography
• Attacks & Malicious Code
• Authentication, Identification
• Biometrics
• Block & Stream Ciphers
• Blockchain Security and Privacy
• Cryptographic Algorithms and Primitivess
• Cryptographic Protocols
• Cyberphysical Security
• Data and Application Security
• Data and Computation Integrity
• Data Protection
• Denial of Service Protection
• Embedded System Security
• Formal Methods for Security
• Hash Functions
• Identity Management
• Key Management
• Language-Based Security
• Malware Analysis and Detection
• Network Security

• Security and Privacy for Big Data
• Security and Privacy in the Cloud
• Security in Content Delivery
• Security in Crowdsourcing
• Security in Grid Computing
• Security in the Internet of Things
• Security in Location Services
• Security in Pervasive Systems
• Security in Social Networks
• Sensor Network Security
• Trust Management
• Usable Security
• Virtual Private Networks
• Wireless and Mobile Security
• Peer-to-Peer Security & Privacy
• Privacy-Enhancing Technologies
• Public Key Cryptography
• Secure Distributed Computing
• Security Architectures
• Security Metrics
• Security Models
• Security Policies

Journal Special Issues
Selected quality papers will be invited for publicaction in two joural special issues. The detail informaiton will be provided after confirmed by the publishers.
 

Related Resources

CANS 2019   The 18th International Conference on Cryptology And Network Security
SP 2020   IEEE Symposium on Security and Privacy
Cyber Security 2020   IEEE International Conference on Cyber Security and Protection of Digital Services
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
SeTM 2019   Security and Trust in Mobile Network 2019
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
RuhrSec 2020   RuhrSec 2020
ICSS 2019   5th International Conference on Software Security