posted by system || 5175 views || tracked by 15 users: [display]

CANS 2013 : International Conference on Cryptology and Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Cryptology and Network Security
 
Link: http://www.ic.unicamp.br/cans2013/cfp.php
 
When Nov 20, 2013 - Nov 22, 2013
Where Paraty, Brazil
Submission Deadline Jun 11, 2013
Categories    networking   security
 

Call For Papers

Topics of Interest

Access Control
Anonymity
Authentication, Identification
Biometrics
Block and Stream Ciphers
Cloud Security
Cryptographic Algorithms, Protocols
Denial of Service
Embedded Platform Security
Hash Functions
(Future) Internet Security
Key Management
Network Security
Peer-to-Peer Security
Identity and Trust Management
Public-key Cryptography
Secure Hardware
Security Modeling and Architectures
Spyware Analysis and Detection
Wireless and Mobile Security

Instructions for Authors

Submissions should be at most 12 pages excluding references and clearly marked appendices, and at most 20 pages in total, using reasonable margins and font size. The submitted paper should be intelligible and self-contained without appendices, as committee members are not required to read them.

Submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. The submission should begin with a title, a short abstract, and a list of keywords, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions ignoring these guidelines risk rejection without consideration of their merits. If accepted, one of the authors is expected to present the paper at the conference.

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Accepted submissions may not appear in any other conference or
workshop with proceedings. Submissions violating these rules will be rejected and may entail further consequences. Program Co-Chairs reserve the right to share information about submissions with other Program Committees.

Papers must be submitted electronically. The electronic-submission site is available at https://cans2013.di.ens.fr/ichair/.

As in previous years, it is the intention that accepted papers will be published in Springer's Lecture Notes in Computer Science (LNCS) and will be available at the conference. Instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. Authors are encouraged to prepare their submissions following Springer's guideline. These instructions are mandatory for the final papers.

Related Resources

ACNS 2018   Applied Cryptography and Network Security
IJRAP 2017   International Journal of Recent advances in Physics
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
DACS 2018   Data Analytics for Cyber Security Workshop
BioSTAR 2018   3rd International Workshop on Bio-inspired Security, Trust, Assurance and Resilience
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ICC 5G-Security 2018   The First IEEE Workshop on 5G Wireless Security - ICC 2018
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
CCSEA 2018   8th International Conference on Computer Science, Engineering and Applications
DISSECT 2018   IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies