posted by system || 2556 views || tracked by 9 users: [display]

ACNS 2008 : Applied Cryptography and Network Security


Conference Series : Applied Cryptography and Network Security
When Jun 3, 2008 - Jun 6, 2008
Where New York, NY, USA
Submission Deadline Jan 14, 2008
Notification Due Mar 14, 2008
Categories    cryptography   security   networking

Call For Papers

ACNS 2008: Call for Papers

Location: Columbia University, New York City, New York, USA
Date: June 3-6, 2008
Submission Deadline: 14 January 2008 23:59:59 EST
Author Notification: 14 March 2008


Original papers on all aspects of applied cryptography and network security are solicited
for submission to ACNS '08. Topics of relevance include but are not limited to:

* Applied cryptography and provably-secure cryptographic protocols
* Design and analysis of efficient cryptographic primitives: public-key and symmetric-key
cryptosystems, block ciphers, and hash functions
* Network security protocols
* Techniques for anonymity; trade-offs between anonymity and utility
* Integrating security into the next-generation Internet: DNS security, routing, naming,
denial-of-service attacks, TCP/IP, secure multicast
* Economic fraud on the Internet: phishing, pharming, spam, and click fraud
* Email and web security
* Public key infrastructure, key management, certification, and revocation
* Security and privacy for emerging technologies: sensor networks, mobile (ad hoc)
networks, peer-to-peer networks, bluetooth, 802.11, RFID
* Trust metrics and robust trust inference in distributed systems
* Security and usability
* Intellectual property protection: metering, watermarking, and digital rights
* Modeling and protocol design for rational and malicious adversaries
* Automated analysis of protocols

Papers suggesting novel paradigms, original directions, or non-traditional perspectives are
especially welcome.

As in previous years, there will be an academic track and an industrial track. Submissions
to the academic track should emphasize research contributions, while submissions to the
industrial track may focus on implementation and deployment of real-world systems.
Submissions for the industrial track must clearly indicate this in the title. Proceedings
for the academic track will be published in Springer-Verlag's Lecture Notes in Computer
Science and will be available at the conference. Papers accepted to the industrial track
will be published in a different venue.


Submission Deadline: 14 January,2008 23:59:59 EST
Author Notification Date: 14 March, 2008
Final Version Deadline: 4 April, 2008
Conference: June 3-6, 2008


Masayuki Abe (NTT, Japan)
Ben Adida (Harvard University, USA)
Feng Bao (Institute for Infocomm Research, Singapore)
Lujo Bauer (CMU, USA)
Giampaolo Bella (University of Catania, Italy)
Steven Bellovin, co-chair (Columbia University, USA)
John Black (University of Colorado, USA)
Nikita Borisov (University of Illinois Urbana-Champaign, USA)
Colin Boyd (Queensland University of Technology, Australia)
Dario Catalano (University of Catania, Italy)
Debra Cook (Alcatel-Lucent Bell Labs, USA)
Alexander W. Dent (Royal Holloway, University of London, UK)
Nelly Fazio (IBM Research, USA)
Marc Fischlin (Darmstadt University of Technology, Germany)
Debin Gao (Singapore Management University, Singapore)
Rosario Gennaro, co-chair (IBM Research, USA)
Peter Gutmann (University of Auckland, New Zealand)
Danny Harnik (IBM Research)
John Ioannidis (Packet General Networks, USA)
Stanislaw Jarecki (University of California Irvine, USA)
Ari Juels (RSA Laboratories, USA)
Kaoru Kurosawa (Ibaraki University, Japan)
Yehuda Lindell (Bar-Ilan University, Israel)
Javier Lopez (University of Malaga, Spain)
Jelena Mirkovic (USC/ISI, USA)
David Naccache (Ecole Normale Superieure, France)
Alina Oprea (RSA Laboratories, USA)
Tom Shrimpton (Portland State University, USA)
Jonathan Smith (University of Pennsylvania, USA)
Angelos Stavrou (George Mason University, USA)
Xiaoyun Wang (Shandong University, China)
Nicholas Weaver (ICSI Berkeley, USA)
Steve Weis (Google, USA)
Tara Whalen (Dalhousie University, Canada)
Michael Wiener (Cryptographic Clarity, Canada)
Avishai Wool (Tel-Aviv University, Israel)
Diego Zamboni (IBM Research, Switzerland)
Jianying Zhou (Institute for Infocomm Research, Singapore)


Submissions must be anonymous, with no author names, affiliations, acknowledgments, or
obvious references. Submissions should be in English, in PDF format with all fonts embedded,
typeset with 11pt font or larger, and using reasonable spacing and margins. They should not
exceed 12 letter-sized pages, not counting the bibliography and appendices. Papers should
begin with a title, abstract, and an introduction that clearly summarizes the contributions
of the paper at a level appropriate for a non-specialist reader. Papers should contain a
scholarly exposition of ideas, techniques, and results, including motivation, relevance to
practical applications, and a clear comparison with related work. Committee members are not
required to read appendices, and papers should be intelligible without them. Submitted
papers risk being rejected without consideration of their merits if they do not follow all
the above guidelines.

Submissions must not substantially duplicate work that was published elsewhere, or work that
any of the authors has submitted in parallel to any other conference or workshop that has
proceedings. Plagiarism and double submissions will be dealt with harshly.

Authors will be asked to indicate whether their submissions should be considered for the
best student paper award; any paper co-authored by a full-time student is eligible for this

Authors of accepted papers must guarantee that their paper will be presented at the

Related Resources

ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
IJMSA 2017   International Journal of Modeling, Simulation and Applications
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
VLSIA 2017   3rd International Conference on VLSI and Applications
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ICCSP - Ei & Scopus 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities