posted by user: tell || 2652 views || tracked by 6 users: [display]

PKC 2016 : 19th International Conference on the Theory and Practice of Public-Key Cryptography

FacebookTwitterLinkedInGoogle


Conference Series : Public Key Cryptography
 
Link: http://troll.iis.sinica.edu.tw/pkc16/
 
When Mar 6, 2016 - Mar 9, 2016
Where Tapei, Taiwan
Submission Deadline Oct 5, 2015
Notification Due Dec 11, 2015
Final Version Due Jan 4, 2016
Categories    cryptography   public-key cryptography
 

Call For Papers

Please also see the call for papers in pdf format.

The International Conference on Practice and Theory in Public-Key Cryptography (PKC) is organized annually by the International Association for Cryptologic Research (IACR). PKC is IACR's main annual conference focusing specifically on all aspects of Public-Key Cryptography. The PKC'16 proceedings will be published in Springer's LNCS Series and will be available at the conference.

Submissions must not substantially duplicate work that any of the authors has published elsewhere, or has submitted in parallel to any journal or any other conference/workshop with proceedings. Accepted submissions may not appear in any other conference or workshop with proceedings. Submissions violating these rules will be rejected and may entail further consequences. IACR reserves the right to share information about submissions with other program committees to detect parallel submissions.
In order to harmonize submission and publication format, submission text will have the same limit of 30 pages in LNCS format as the final version. This includes title page and references. The submission text can be followed by supplementary material of any length. These rules will be strictly enforced. The paper should be intelligible and self-contained without the supplementary material, as committee members are not required to read them. Submissions should be prepared using LaTeX and submitted as PDF using type-1 fonts. The above guidelines will be strictly enforced. Papers must be submitted electronically; a detailed description of the electronic submission procedure will be provided.
Submissions must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. Each paper must start with title, abstract, and keywords, followed by a succinct statement appropriate for a non-specialist reader, specifying the subject addressed, its background, main results, and their significance. Technical details directed to the specialist should then follow.
An author of each accepted paper is required to register and present the paper at the conference.

Related Resources

TPSM 2018   TASS 2nd International Conference On Theory and Practice in Social Sciences & Management Studies
IJCSITY 2018   International Journal of Computational Science and Information Technology
ECIIC 2018   10th European Conference on Intangibles and Intellectual Capital
CAIJ 2018   Computer Applications: An International Journal
IOV 2018   The 5th International Conference on Internet of Vehicles 2018
SECURWARE 2018   The Twelfth International Conference on Emerging Security Information, Systems and Technologies
AVC 2018   Advances in Vision Computing: An International Journal
SI: Cloud-Big Data (SIMPAT) 2018   Special Issue on Modeling and Simulation of Cloud Computing and Big Data, Simulation Modelling Practice and Theory, Elsevier
SETA 2018   The 10th conference on SEQUENCES AND THEIR APPLICATIONS
Satellite Events of ETAPS 2019   The European Joint Conferences on Theory and Practice of Software (ETAPS) - Call for Satellite Events