posted by user: jensaamc || 2473 views || tracked by 4 users: [display]

IMACC 2015 : 15th IMA International Conference on Cryptography and Coding 2015

FacebookTwitterLinkedInGoogle

Link: http://www.cs.ucl.ac.uk/staff/j.groth/IMACC.html
 
When Dec 15, 2015 - Dec 17, 2015
Where University of Oxford
Submission Deadline Jun 26, 2015
Notification Due Aug 28, 2015
Final Version Due Sep 14, 2015
Categories    coding   information theory   cryptography
 

Call For Papers

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this fifteenth International Conference in an established and successful IMA series on the theme of "Cryptography and Coding" is both timely and relevant. Original research papers on all technical aspects of cryptography and coding are solicited for submission. The proceedings will be published in Springer's Lecture Notes in Computer Science series, and will be available at the conference.

Important Dates:
Submission Deadline: 26 June 2015, 22:00 UTC
Author Notification: 28 August 2015
Proceedings Version Deadline: 14 September 2015
Conference: 15 - 17 December 2015

Instructions for Authors:
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or any other conference or workshop with proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online.

All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Submissions should begin with a cover page containing title, a short abstract, and a list of keywords. The body of the paper should be at most 14 pages, excluding the title page with abstract, the bibliography, and clearly marked appendices. Committee members are not required to review appendices, so the paper should be intelligible and self-contained within this length. The text should be in a single column format, in at least 11-point fonts and have reasonable margins. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Best Paper Award:
The program committee may choose to award a best paper award.

Related Resources

ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
PCS 2018   Picture Coding Symposium
ACNS 2018   Applied Cryptography and Network Security
SECRYPT 2018   15th International Conference on Security and Cryptography
IJFCST 2018   International Journal on Foundations of Computer Science & Technology
IJCIS 2018   International Journal on Cryptography and Information Security
IJSCAI 2018   International Journal on Soft Computing, Artificial Intelligence and Applications
SECURWARE 2018   The Twelfth International Conference on Emerging Security Information, Systems and Technologies
ISDFS 2018   6th International Symposium on Digital Forensic and Security
ICCSP - Ei & Scopus 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus