posted by organizer: inscrypt || 2917 views || tracked by 5 users: [display]

Inscrypt 2013 : The 9th China International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : Information Security and Cryptology
 
Link: http://www.inscrypt.cn/2013/Inscrypt_2013.html
 
When Nov 27, 2013 - Nov 30, 2013
Where Guangzhou, China
Submission Deadline Aug 22, 2013
Notification Due Oct 22, 2013
Final Version Due Nov 21, 2013
 

Call For Papers

CALL FOR PAPERS
9th International Conference on Information Security and Cryptology
Inscrypt 2013

November 27 - 30, 2013, Guangzhou, China
http://www.inscrypt.cn/

The 9th China International Conference on Information Security and Cryptology
(INSCRYPT 2013) will be held in Guangzhou from November 27 to November 30, 2013.
Inscrypt 2013 seeks high-quality research contributions in the form of well developed
papers. Topics of interest encompass research advances in ALL areas of information
security, cryptology, and their applications. The conference proceedings will be
published by Springer-Verlag in LNCS series.

Papers
======

Authors are invited to submit full papers presenting new research results related
to cryptology, information security and their applications. All submissions must
describe original research that is not published or currently under review by another
conference or journal. Areas of interest include, but are not limited to:

Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Big Data and Cloud Security
Electronic Commerce Security
Intrusion Detection
Information Hiding and Watermarking
Key Management and Key Recovery
Network Security
Security Protocols and Their Analysis
Security Modeling and Architectures
Provable Security
Secure Multiparty Computation
Foundations of Cryptography
Secret Key and Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes

Instruction for Authors
=======================

Conference language is English. All submissions must be anonymous, with no author
names, affiliations, acknowledgments, or obvious references. It should begin with
a title, a short abstract, and a list of key words, and its introduction should
summarize the contributions of the paper at a level appropriate for a non-specialist
reader. The paper should be intelligible and self-contained within 20 pages including
references and appendices and must be submitted electronically to
http://www.easychair.org/conferences/?conf=inscrypt2013.
Submissions not meeting these guidelines risk rejection without consideration of their
merits. It is highly advised to prepare the submissions in the Springer LNCS format
(see http://www.springeronline.com/sgw/cda/frontpage/0,11855,5-164-2-72376-0,00.html).
More information can be found at conference web site http://www.inscrypt.cn/.

Important Dates
===============

Deadline for Submission: August 22, 2013
Notification of Acceptance: October 22, 2013
Pre-proceedings version deadline: November 5, 2013
Proceedings version deadline: December 21, 2013

General Chair:
==============
Dingyi Pei Guangzhou University, China

Program Co-Chairs:
===============

Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, China
Shouhuai Xu University of Texas at San Antonio, USA
Moti Yung Google Inc. and Columbia University, USA

Technical Program Committee
===========================

Gouqiang Bai Tsinghua University
Elisa Bertino Purdue University
Zhenfu Cao Shanghai Jiaotong University
Bogdan Carbunar Florida International University
Kefei Chen Shanghai Jiaotong University
Liqun Chen Hewlett-Packard Laboratories
Zhong Chen Peking University
Sherman S. M. Chow Chinese University of Hong Kong
Ed Dawson Research Director
Jintai Ding University of Cincinnati
Cunsheng Ding Hong Kong University of Science and Technology
Xuhua Ding Singapore Management University
Shlomi Dolev Ben-Gurion University of the Negev
Yingfei Dong University of Hawaii
Lei Hu SKLOIS, Chinese Academy of Sciences, China
Miroslaw Kutylowski Wroclaw University of Technology
Xuejia Lai Shanghai Jiaotong University
Jiangtao Li Intel Corporation
Hui Li Xidian University
Zhiqiang Lin University of Texas at Dallas
Donggang Liu University of Texas at Arlington
Peng Liu The Pennsylvania State University
Di Ma University of Michigan-Dearborn
Subhamoy Maitra Indian Statistical Institute
Florian Mendel Graz University of Technology, Austria
Atsuko Miyaji Japan Advanced Institute of Science and Technology
Yi Mu University of Wollongong, Australia
Claudio Orlandi Aarhus University
Xinming Ou Kansas State University
Ludovic Perret UPMC/LIP6 INRIA/SALSA
Giuseppe Persiano Universita' di Salerno
Bertram Poettering Royal Holloway, University of London
Kouichi Sakurai Kyushu University
Nitesh Saxena University of Alabama at Birmingham
Jae Hong Seo Myongji University, Youngin, Republic of Korea
Claudio Soriente ETH Z├╝rich
Wen-Guey Tzeng National Chiao Tung University
Yevgeniy Vahlis AT&T Labs
Xiaofeng Wang Indiana University, USA
Wenling Wu Institute of Software, CAS, China
Huaxiong Wang Nanyang Technological University
Guilin Wang University of Wollongong
Duncan Wong City University of Hong Kong
Maozhi Xu Peking University
Danfeng Yao Virginia Tech
Chung-Huang Yang National Kaohsiung Normal University
Yunlei Zhao Fudan University
Fangguo Zhang Sun Yat-sen University
Rui Zhang Chinese Academy of Sciences, P.R.C.
Hong-Sheng Zhou University of Maryland
Yuliang Zheng UNC Charlotte
Cliff Zou University of Central Florida

Related Resources

eCrime 2018   13th Symposium on Electronic Crime Research
ICISA 2018   9th iCatse Conference on Information Science and Applications
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
WEIS 2018   Workshop on the Economics of Information Security
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
ICCFI--Ei Compendex and Scopus 2018   2018 2nd International Conference on Communications and Future Internet (ICCFI 2018)--Ei Compendex and Scopus
ICCFI--Ei and Scopus 2018   2018 2nd International Conference on Communications and Future Internet (ICCFI 2018)--Ei Compendex and Scopus
ICEBT--EI and Scopus 2018   2018 The 2nd International Conference on E-Education, E-Business and E-Technology (ICEBT 2018)--EI Compendex and Scopus
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ICITA 2018   International Conference on Information Technology and Applications