posted by organizer: markulf || 802 views || tracked by 1 users: [display]

CANS 2024 : Cryptology and Network Security


When Sep 24, 2024 - Sep 27, 2024
Where Cambridge, UK
Submission Deadline Apr 14, 2024
Notification Due Jun 17, 2024
Final Version Due Jul 1, 2024
Categories    network security   cryptography   cyber security

Call For Papers


CANS 2024 -- Call For Papers

September 24th -- September 27th, 2024, Cambridge, UK

*** The deadline for submissions is 14 April anywhere on earth (AoE) ***

The International Conference on Cryptology and Network
Security (CANS) is a premier forum for presenting research in the
field of cryptology and network security. The conference seeks
academic, industry, and government submissions on all theoretical
and practical cryptology and network security aspects. This year
marks the 23rd iteration of the conference and will be held at
the University of Cambridge, England. Proceedings of previous
iterations of the conference were published by Springer LNCS and
we have applied to do the same this year.



High quality papers on unpublished research and implementation
experiences may be submitted. All papers must be original and not
substantially duplicated work that has been published at, or is
simultaneously submitted to, a journal or another conference or
workshop. All submissions must be written in English and span no
more than 20 pages in the Springer’s Lecture Notes in Computer
Science (LNCS) format (a Springer template can be found in
Overleaf), including title, abstract, and bibliography. The
introduction should summarize the contributions of the paper at a
level understandable by a non-expert reader and explain the
context to related work.

Submitted papers may contain supplementary material in the form
of well-marked appendices. Note that supplementary material will
not be included in the proceedings. Moreover, the main paper
should be intelligible without requiring the reader to consult
the supplementary material.

Submissions must be anonymous (no author names, affiliations,
acknowledgments, or obvious references). The conference will also
consider short papers of up to eight pages in the LNCS format,
excluding the bibliography (max 2 pages), for results that are
not yet fully fleshed out or that simply require few pages to
describe but still make a significant contribution.

All submissions must be processed with LaTeX2e according to the
instructions given by Springer. Submitted manuscripts must be
typeset in plain Springer LNCS format, in particular without
changing the font size, margins or line spacing. Submissions not
meeting these guidelines may be rejected without consideration of
their merits.

Papers must be submitted via EasyChair. The deadline for
submissions is 14 April anywhere on earth (AoE).


At least one author of every accepted paper must register and pay
the full registration fee (non-student) for the conference by the
early registration deadline indicated by the organizers. Papers
without a registered author will be removed from the
sessions. Authors must present their own paper(s). Session
proceedings, including all accepted papers, will be published
in LNCS and will be available at the conference.


Submission: April 14 AoE
Notification: June 17
Camera-ready: July 1
Registration: From July
Conference: September 24-27


- Access Control
- Anonymity and Censorship Resistance
- Applied Cryptography
- Artificial Intelligence for Security
- Attacks & Malicious Code
- Biometrics
- Block & Stream Ciphers
- Blockchain Security and Privacy
- Cognitive Cities Security and Privacy
- Confidential Computing
- Cryptographic Algorithms and Primitives
- Cryptographic Protocols
- Cyber Physical Security
- Data and Application Security
- Denial of Service Protection
- Data and Computation Integrity
- Edge/Fog Computing Security and Privacy
- Embedded System Security
- Formal Methods for Security and Privacy
- Hash Functions
- Identity Management and Privacy
- IoT Security
- Key Management
- Location Based Services Security and Privacy
- Malware Analysis and Detection
- Network Security
- On-line Social Networks Security and Privacy
- Peer-to-Peer Security and Privacy
- Privacy-Enhancing Technologies
- Public Key Cryptography
- Security and Privacy for Big Data
- Security and Privacy in the Cloud
- Security and Privacy of ML and AI based Systems
- Security and Resilient solutions for Critical Infrastructures
(e.g., Smart Grid, TelCo Networks, AirPorts, Ports…)
- Security Architectures
- Security in Content Delivery
- Security Models
- Secure Multi-Party Computation
- Secure Distributed Computing
- Security in Pervasive Systems
- Sensor Network Security
- Security in Crowdsourcing
- Trust Management
- Usable Security
- Virtual Private Networks
- Web Security
- Wireless and Mobile Security
- Zero-Knowledge Proofs


General Chair

- Alastair Beresford, University of Cambridge

Program Committee Co-Chairs

- Markulf Kohlweiss, University of Edinburgh
- Roberto Di Pietro, King Abdullah University of Science and Technology

Publicity Chairs

- Nik Sultana, Illinois Institute of Technology
- Natalia Stakhanova, University of Saskatchewan


Related Resources

CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACC6G 2025   2025 Asia Conference on Communications and 6G (ACC6G 2025)
ICACT 2025   The 27th International Conference on Advanced Communications Technology (ICACT)
CTCM 2024   10th International Conference of Control Theory and Computer Modelling
CANS 2024   The International Conference on Cryptology and Network Security (CANS)
CSEN 2024   11th International Conference on Computer Science and Engineering
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ICONSEC 2024   3rd International Conference On Cyber Security and Digital Forensics