posted by user: tell || 1985 views || tracked by 17 users: [display]

FC 2016 : Financial Cryptography


Conference Series : Financial Cryptography
When Feb 22, 2016 - Feb 26, 2016
Where Accra Beach Hotel & Spa, Barbados
Submission Deadline Oct 2, 2015
Notification Due Nov 22, 2015
Final Version Due Jan 4, 2016
Categories    cryptography   security   financial service

Call For Papers

Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on financial, economic and commercial transaction security. Original works focusing on securing commercial transactions and systems are solicited; fundamental as well as applied real-world deployments on all aspects surrounding commerce security are of interest. Submissions need not be exclusively concerned with cryptography. Systems security, economic or behavioral perspectives, and interdisciplinary efforts are particularly encouraged.

Topics of interests include, but are not limited to:
Access Control
Anonymity and Privacy
Applied Cryptography
Auctions and Mechanisms
Authentication and Identification
Behavioral Aspects of Security and Privacy
Certification and Audits
Cloud Computing and Data Outsourcing Security
Commercial Cryptographic Applications
Contactless Payment and Ticketing Systems
Cryptographic Currencies
Digital Cash and Payment Systems
Digital Rights Management
Economics of Security and Privacy
Electronic Commerce Security
Electronic Crime and Underground Markets
Fraud Detection and Forensics
Game Theory for Security and Privacy
Identity Theft
Insider Threats
Legal and Regulatory Issues
Microfinance and Micropayments
Mobile Systems Security and Privacy
Phishing and Social Engineering
Reputation Systems
Risk Assessment and Management
Secure Banking and Financial Services
Smart Contracts and Financial Instruments
Smartcards, Secure Tokens and Secure Hardware
Social Networks Security and Privacy
Trust Management
Usability and Security
Virtual Goods and Virtual Economies
Voting Systems
Web Security

* Important Dates

Workshop proposal submission August 15, 2015
Workshop proposal notification August 30, 2015
Paper submission October 2, 2015
Paper notification November 22, 2015
Poster and panel submission December 4, 2015
Poster and panel notification December 13, 2015
Final papers January 4, 2016
Conference February 22–26, 2016

* Submission

Submissions are sought in the following categories:
(i) regular papers (15 pages LNCS format excluding references and appendices),
(ii) short papers (8 pages LNCS format in total),
(iii) panel and workshop proposals (2 pages), and
(iv) posters (1 page).
The regular and short paper submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. In contrast, panel, workshop proposal, and poster submissions must include author names and affiliations.

Papers must be formatted in standard LNCS format and submitted as PDF files. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found here and at the submission site. For each accepted paper the conference requires at least one registration at the general or academic rate.

Authors may only submit work that does not substantially overlap with work that is currently submitted or has been accepted for publication to a conference/workshop with proceedings or a journal. We consider double submission serious research fraud and will treat it as such. In case of doubt contact the program chairs for any clarifications at

All submissions should be uploaded through the conference submission website.

* Regular Research Papers

Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages excluding references and appendices. A total page restriction may apply for the printed proceedings version. Committee members are not required to read the appendices, so the full papers should be intelligible without them. Regular papers must be anonymous with no author names, affiliations, acknowledgments, or obvious references.

* Short Papers

Short papers are also subject to peer review, however, the intention is to encourage authors to introduce work in progress, novel applications and corporate/industrial experiences. Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues. Short paper submissions are limited to 8 pages in standard LNCS format in total. The paper title for short papers should necessarily include the text "Short Paper." Accepted submissions will be included in the conference proceedings. Short papers must be anonymous with no author names, affiliations, acknowledgments, or obvious references.

Related Resources

FC 2017   Financial Cryptography and Data Security 2017
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ACM CCS 2016   23rd ACM Conference on Computer and Communications Security
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ORAJ 2016   Operations Research and Applications: An International Journal
CANS 2016   15th International Conference on Cryptology and Network Security
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
ASIACRYPT 2016   The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
PKC 2017   20th International Conference on Practice and Theory of Public-Key Cryptography