posted by user: KevinChen || 877 views || tracked by 6 users: [display]

Inscrypt 2015 : 11th International Conference on Information Security and Cryptology


Conference Series : Information Security and Cryptology
When Nov 1, 2015 - Nov 3, 2015
Where Beijing
Submission Deadline Aug 10, 2015
Notification Due Oct 8, 2015
Final Version Due Oct 15, 2015

Call For Papers

11th International Conference on Information Security and Cryptology
Inscrypt 2015
November 1 - 3, 2015, Beijing, China

--- In Cooperation with IACR ---

The 11th China International Conference on Information Security and Cryptology
(Inscrypt 2015) will be held in Beijing, from November 1 to 3, 2015, co-organized
by the State Key Laboratory of Information Security, the Chinese Association for
Cryptologic Research of China, and In Cooperation with IACR. It is an annual
conference targeting the top research results in the related area. Topics of
interest encompass research advances in ALL areas of information security,
cryptology, and their applications. Inscrypt 2015 seeks high-quality research
contributions in the form of well-developed papers, and two successive tracks for
crypto and security respectively will be organized. The conference proceedings
will be published by Springer-Verlag in LNCS series.

Authors are invited to submit full papers presenting new research results related
to cryptology, information security and their applications for either crypto track
or security track. All submissions must describe original research that is not published
or currently under review by another conference or journal. Areas of interest include,
but are not limited to:

Crypto Track:
Foundations of Cryptography
Provable Security
Sequences and Boolean Functions
Secure Multiparty Computation
Symmetric Key Cryptosystems
Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Key Management and Key Recovery
Security Protocols and Their Analysis
Information Hiding and Watermarking
Secure Computation Outsourcing
Functional Computation and Verifiable Computation
Leakage Resilient Cryptography

Security Track:
Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Electronic Commerce Security
Intrusion Detection
Network Security
Security Modeling and Architectures
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
Privacy Enhancing Technologies
Genomic Privacy and SDN Security
Big Data and Cloud Security

Instruction for Authors
Conference language is English. All submissions must be anonymous, with no author
names, affiliations, acknowledgments, or obvious references. It should begin with
a title, a short abstract, and a list of key words, and its introduction should
summarize the contributions of the paper at a level appropriate for a non-specialist
reader. The paper should be intelligible and self-contained within 20 pages including
references and appendices and must be submitted electronically to .
Submissions not meeting these guidelines risk rejection without consideration of their
merits. It is highly advised to prepare the submissions in the Springer LNCS format.
More information can be found at conference web site

Important Dates
Deadline for Submission: August 10, 2015
Notification of Acceptance: October 8, 2015
Pre-proceedings version deadline: October 15, 2015
Proceedings version deadline: December 3, 2015

Conference Chair:
Dan Meng, Institute of Information Engineering, CAS, China
Jianying Zhou, Institute for Infocomm Research, Singapore

Program Co-Chairs:
Dongdai Lin, Institute of Information Engineering, CAS, China
Xiaofeng Wang, Indiana University at Bloomington, USA
Moti Yung, Google Inc. & Columbia University, USA

Local Orgranizing committee Co-Chairs:
Chuankun Wu, Institute of Information Engineering, CAS, China
Yanping Yu, Chinese Association for Cryptologic Research, China

Publicity Chair
Kai Chen, SKLOIS, Institute of Information Engineering, CAS, China

Technical Program Committee
Erman Ayday Bilkent University, Turkey
Elisa Bertino Purdue University, USA
Ioana Boureanu Akamai Technologies Limited, UK
Kai Chen Institute of Information Engineering, CAS, China
Kefei Chen Hangzhou Normal University, China
Liqun Chen Hewlett-Packard Laboratories, UK
Xiaofeng Chen Xidian University, China
Sherman S. M. Chow Chinese University of Hong Kong, China
Nicolas Courtois University College London, UK
Laszlo Csirmaz Central European University, Hungary
Jintai Ding University of Cincinnati, USA
Cunsheng Ding Hong Kong University of Science and Technology, China
Yingfei Dong University of Hawaii, USA
Chun-I Fan National Sun Yat-sen University, Taiwan
Debin Gao Singapore Management University, Singapore
Dawu Gu Shanghai Jiao Tong University, China
Huaqun Guo Institute for Infocomm Research, Singapore
Jian Guo Nanyang Technological University, Singapore
Weili Han Fudan University, China
Feng Hao Newcastle University, UK
Tor Helleseth University of Bergen, Norway
Matt Henricksen Institute For Infocomm Research, Singapore
Lei Hu Institute of Information Engineering, CAS, China
Xinyi Huang Fujian Normal University, China
Mehmet Sabir Kiraz TUBITAK BILGEM, Turkey
Ninghui Li Purdue University, USA
Yingjiu Li Singapore Management University, Singapore
Tieyan Li Huawei, Singapore
Xin Li John Hopkins University, USA
Peng Liu The Pennsylvania State University, USA
Yang Liu Nanyang Technological University, Singapore
Di Ma University of Michigan-Dearborn, USA
Subhamoy Maitra Indian Statistical Institute, India
Florian Mendel Graz University of Technology, Austria
Atsuko Miyaji Japan Advanced Institute of Science and Technology, Japan
Maria Naya-Plasencia Inria, France
Giuseppe Persiano Universita di Salerno, Italy
Thomas Peters Ecole Normale Superieure, France
Josef Pieprzyk Queensland University of Technology, Australia
Bertram Poettering Ruhr University Bochum, Germany
Zhiyun Qian University of California, Riverside, USA
Longjiang Qu National University of Defense Technology, China
Giovanni Russello The University of Auckland, New Zealand
Seungwon Shin KAIST, Korea
Willy Susilo University of Wollongong, Australia
Shaohua Tang South China University of Technology, China
Vijay Varadharajan Macquarie University, Australia
Cong Wang City University of Hong Kong, China
Meiqin Wang Shandong University, China
Jian Weng Jinan University, China
Wenling Wu Institute of Software, CAS, China
Shouhuai Xu University of Texas at San Antonio, USA
Wenyuan Xu Zhejiang University, China
Danfeng Yao Virginia Tech, USA
Ting Yu Qatar Computing Research Institute, Qatar
Yu Yu Shanghai Jiao Tong University, China
Kehuan Zhang Chinese University of Hong Kong, China
Fangguo Zhang Sun Yat-sen University, China
Yuliang Zheng University of Alabama at Birmingham, USA
Vassilis Zikas ETH Zurich
Cliff Zou University of Central Florida, USA

Conference email

Related Resources

SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
IJISS 2016   International Journal of Information Security Science (IJISS)
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
CANS 2016   15th International Conference on Cryptology and Network Security
ASIACRYPT 2016   The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
ICITA 2017   International Conference on Information Technology and Applications
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
ADBIS 2017   21st European Conference on Advances in Databases and Information Systems