posted by user: ChickenRun || 1234 views || tracked by 2 users: [display]

ICITS 2013 : The 7th International Conference on Information Theoretic Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Theoretic Security
 
Link: http://www.spms.ntu.edu.sg/mas/conference/icits2013/
 
When Nov 28, 2013 - Nov 30, 2013
Where Singapore
Submission Deadline Jul 12, 2013
Notification Due Aug 30, 2013
Final Version Due Sep 20, 2013
 

Call For Papers

This is the seventh in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptology. Papers on all technical aspects of information-theoretic security and quantum information-theoretic security are solicited for submission to ICITS 2013. Areas of interest include, but are not restricted to:

Unconditional security
Quantum cryptography
Authentication codes
Wiretap channels
Randomness extraction
Codes and cryptography
Lattices and cryptography
Secret sharing
Multiparty Computation
Bounded storage model
Oblivious transfer
Nonlocality and nonsignaling
Quantum information theory
Network coding security
Physical models and assumptions
Physical layer security
Important Dates

Conference Track submission deadline: Friday, July 5, 2013, 13.00 GMT Friday, July 12, 2013, 13.00 GMT
Conference Track notification: Friday, August 30, 2013
Proceedings version: Friday, September 20, 2013

Workshop Track submission deadline: Friday, August 2, 2013, 13.00 GMT
Workshop Track notification: Thursday, September 19, 2013

ICITS 2013 takes place just before Asiacrypt 2013 (December 1–5, Bangalore, India)
Two Tracks, Conference and Workshop

As in the previous edition of the conference, two types of contributed presentations will take place in ICITS 2013. The Conference Track will act as a traditional conference, consisting of original papers with published proceedings. The Workshop Track will operate more like an informal workshop, with papers that have appeared elsewhere or that consist of work in progress.

Conference Track (with proceedings) Submissions to this track must be original papers that have not previously appeared in published form. Accepted papers will be presented at the conference and will appear in the conference proceedings, which will be published by Springer in the Lecture Notes in Computer Science series.

Workshop Track (no proceedings) To encourage presentation of work form a variety of fields, especially those where conference publication is unusual or makes journal publication difficult, “work- shop track” papers are also solicited. Accepted papers will be presented at the conference, but will not appear in the proceedings. Submissions to this track that have previously appeared or are currently submitted elsewhere are acceptable, as long as they first appeared after January 1, 2012. Papers that describe work in progress are also welcome. The same standards of quality will apply to conference and workshop papers.

It is not possible to submit the same work for consideration in both tracks.

Related Resources

eCrime 2018   13th Symposium on Electronic Crime Research
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
IH&MMSec 2018   ACM Workshop on Information Hiding and Multimedia Security
WEIS 2018   Workshop on the Economics of Information Security
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
ICISA 2018   9th iCatse Conference on Information Science and Applications
SIGIR 2018   International ACM SIGIR Conference on Research and Development in Information Retrieval
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
ICITA 2018   International Conference on Information Technology and Applications
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications