ACNS: Applied Cryptography and Network Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ACNS 2016 14th International Conference on Applied Cryptography and Network Security
Jun 19, 2016 - Jun 22, 2016 London (Guildford), United Kingdom Feb 10, 2016
ACNS 2015 Applied Cryptography and Network Security
Jun 2, 2015 - Jun 5, 2015 New York, United State Jan 16, 2015
ACNS 2014 12th International Conference on Applied Cryptography and Network Security
Jun 10, 2014 - Jun 13, 2014 Lausanne, Switzerland Jan 20, 2014
ACNS 2013 Applied Cryptography and Network Security
Jun 25, 2013 - Jun 28, 2013 Banff, Alberta, Canada Feb 8, 2013
ACNS 2012 10th International Conference on Applied Cryptography and Network Security
Jun 26, 2012 - Jun 29, 2012 Singapore Feb 12, 2012
ACNS 2010 8th International Conference on Applied Cryptography and Network Security
Jun 22, 2010 - Jun 25, 2010 Beijing, China Feb 5, 2010
ACNS 2008 Applied Cryptography and Network Security
Jun 3, 2008 - Jun 6, 2008 New York, NY, USA Jan 14, 2008
 
 

Present CFP : 2016

=================================================================
ACNS 2016

The 14th International Conference on Applied Cryptography and Network Security

London (Guildford), United Kingdom, June 19-22, 2016
http://acns2016.sccs.surrey.ac.uk/

CALL FOR PAPERS
=================================================================

The 14th International Conference on Applied Cryptography and Network Security will be organised by the Surrey Centre for Cyber Security (SCCS) and held at the University of Surrey in London (Guildford), UK. The proceedings of ACNS 2016 will be published by Springer.

The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (incl. network and computer security) and privacy. This includes submissions from academia/industry on traditional and emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems or applications. Submissions may focus on the modelling, design, analysis (incl. security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms/protocols/standards/implementations/technologies/devices/systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Some topics of interest include but not limited to:

- Access control
- Applied cryptography
- Automated security analysis
- Biometric security/privacy
- Complex systems security
- Critical infrastructures
- Cryptographic primitives
- Cryptographic protocols
- Data protection
- Database/system security
- Digital rights management
- Email and web security
- Future Internet security
- Identity management
- IP protection
- Internet fraud, cybercrime
- Internet-of-Things security
- Intrusion detection
- Key management
- Malware
- Mobile/wireless/5G security
- Network security protocols
- Privacy/anonymity, PETs
- Pervasive security
- Security in e-commerce
- Security in P2P systems
- Security in grid systems
- Cloud security/privacy
- Security/privacy metrics
- Trust management
- Ubiquitous security/privacy
- Human factors in security
- Usability in security/privacy

Important dates
===============

Submission 10 February 2016, 23:59 GMT
Notification 27 March 2016
Final version 02 April 2016

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Each submission must begin with a title, author names and affiliations, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see http://www.springeronline.com/lncs) with a page limit of 18 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility should be mentioned upon submission). Papers should be submitted electronically via https://easychair.org/conferences/?conf=acns2016
 

Related Resources

IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
FC 2017   Financial Cryptography and Data Security 2017
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
AEIJ 2016   Advanced Energy: An International Journal
ORAJ 2016   Operations Research and Applications: An International Journal
WCNC 2017   Wireless Communications and Networking Conference
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
Wamcos 2017   The 1st EAI International Conference on Wireless Networks, Applied Medical Sensor Networks and Computational Science
ICCNS 2016   2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus