posted by system || 4925 views || tracked by 22 users: [display]

CANS 2009 : The 8th International Conference on Cryptology and Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Cryptology and Network Security
 
Link: http://www.rcis.aist.go.jp/cans2009
 
When Dec 12, 2009 - Dec 14, 2009
Where Kanazawa, Japan
Submission Deadline Jun 17, 2009
Notification Due Aug 14, 2009
Final Version Due Sep 4, 2009
Categories    cryptology   security   networking
 

Call For Papers

The 8th International Conference on
CRYPTOLOGY AND NETWORK SECURITY (CANS 2009)

12 - 14 December 2009
Kanazawa, Ishikawa, Japan
Web Page: http://www.rcis.aist.go.jp/cans2009/
Contact: cans2009-info@m.aist.go.jp

[Overview]
The main goal of this conference is to promote research on all
aspects of network security, as well as to build a bridge between
research on cryptography and on network security. We therefore
welcome scientific and academic papers with this focus. Previous
CANS have been held in Taipei (2001), San Francisco (2002), Miami
(2003), Xiamen (2005), Suzhou (2006), Singapore (2007), and Hong
Kong (2008).

[Topics]
Areas of interest for CANS 2009 include, but are not limited to:
- Ad Hoc and Sensor Network Security
- Access Control for Networks
- Anonymity and Pseudonymity
- Authentication Services
- Cryptographic Protocols and Schemes
- Denial of Service Protection
- Digital Rights Management
- Fast Cryptographic Algorithms
- Identity and Trust Management
- Information Hiding and Watermarking
- Internet and Router Security
- Intrusion Detection and Prevention
- Mobile and Wireless Network Security
- Multicast Security
- Phishing and Online Fraud Prevention
- Peer-to-Peer Network Security
- PKI
- Security Modeling and Architectures
- Secure Protocols (SSH, SSL, ...) and Applications
- Spam Protection
- Spyware Analysis and Detection
- Virtual Private Networks

[Instructions for Authors]
Papers on cryptology and network security are welcome. Papers that
make a substantial link between these areas will be given priority.
Authors of such papers are encouraged to elaborate on the relevant
connection in a subsection of the introduction. High-quality
papers on pure cryptology or pure network security may also be
accepted.

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel for
consideration of any other conference or workshop with proceedings.
Submissions should have at most 12 pages excluding the bibliography
and appendices, and at most 20 pages in total, using at least
11-point fonts and with reasonable margins. The total length of the
final versions for Springer's LNCS will be at most 20 pages.
Committee members are not required to read appendices; the paper
should be intelligible without them. All submissions should be
anonymous. Authors of accepted papers must guarantee that at least
one of the authors will attend the conference and present their
paper.

Submitted papers should follow the formatting instructions of the
Springer LNCS Style. Please check the Information for LNCS Authors
page at Springer at http://www.springer.com/lncs for style and
formatting guidelines. Submissions not meeting the submission
guidelines risk rejection without consideration of their merits.

[Proceedings]
The conference proceedings are expected to be published in the
Lecture Notes in Computer Science series by Springer Verlag
(http://www.springer.com/lncs), and be available at the conference.

[Important Dates]
Submission Deadline : 11 June 2009 (23:59:59 GMT)
Acceptance Notification: 14 August 2009
Camera-ready Copy Due : 4 September 2009
Conference : 12 - 14 December 2009

[Best Paper Award]
The Program Committee will consider giving a Best Paper Award to
the submission with highest merits. (Details to be announced.)

[Program Committee and Organizers]
Jointly Organized By:
National Institute of Advanced Industrial Science and Technology
(AIST), Japan
Japan Advanced Institute of Science and Technology (JAIST), Japan

Supported By:
Special Interest Group on Computer Security (CSEC), IPSJ, Japan
Society of Information Theory and its Applications (SITA), Japan

Sponsored By:
National Institute of Information and Communications Technology
(NICT), Japan
ComWorth Co., LTD, Japan

CANS Steering Committee:
Yvo Desmedt University College London, UK
Matt Franklin UC Davis, USA
Lucas Hui The University of Hong Kong, China
Yi Mu University of Wollongong, Australia
David Pointcheval CNRS and ENS, France
Huaxiong Wang NTU, Singapore

General Chair:
Akira Otsuka AIST, Japan

Program Co-Chairs:
Juan A. Garay AT&T Labs - Research, USA
Atsuko Miyaji JAIST, Japan

Program Committee:
Jean-Luc Beuchat Tsukuba Univ, Japan
Alexandra Boldyreva Georgia Tech, US
Colin Boyd Queensland, Australia
Emmanuel Bresson ENS, France
Mike Burmester FSU, US
Koji Chida NTT Labs, Japan
Ee-Chien Chang National University of Singapore, Singapore
Rosario Gennaro IBM Watson, US
Trevor Jim AT&T Labs - Research, US
Charanjit Jutla IBM Watson, US
Senny Kamara Microsoft Research, US
Aggelos Kiayias UConn, US
Vladimir Kolesnikov Bell Labs, US
Dong Hoon Lee Korea Univ, Korea
Pil Joong Lee Pohang University of Science and Technology, Korea
Subhamoy Maitra Indian Statistical Institute, India
Mark Manulis TU Darmstadt, Germany
David Nowak AIST, Japan
Wakaha Ogata Tokyo Institute of Technology, Japan
Kenny Paterson Royal Holloway, University of London, UK
Rene Peralta NIST, US
Josef Pieprzyk Macquarie University, Australia
C. Pandu Rangan IIT Madras, India
German Saez UPC, Spain
Adam Smith Penn State Univ, US
Jessica Staddon PARC, US
Douglas Stinson University of Waterloo, Canada
Willy Susilo University of Wollongong, Australia
Tsuyoshi Takagi Future University - Hakodate, Japan
Gene Tsudik UC Irvine, US
Ivan Visconti University of Salerno, Italy
Duncan S Wong Department of Computer Science City University
of Hong Kong, China
Sung-Ming Yen National Central University, Taiwan
Hong-Sheng Zhou UConn, US
Jianying Zhou I2R, Singapore

Organizing Committee:
Tomoyuki Asano Sony, Japan
Isao Echizen NII, Japan
Shoichi Hirose University of Fukui, Japan
Atsuo Inomata NAIST, Japan
Daisuke Inoue NICT, Japan
Shinichiro Matsuo NTT Data, Japan
Tatsuyuki Matsushita Toshiba, Japan
Natsume Matsuzaki Panasonic, Japan
Kunihiko Miyazaki Hitachi, Japan
Takao Ogura Fujitsu Laboratories, Japan
Yutaka Oiwa AIST, Japan
Takeshi Okamoto Tsukuba University of Technology, Japan
Kazumasa Omote JAIST, Japan
Kensuke Shibata NTT Labs, Japan
Yuji Suga IIJ, Japan
Toshihiro Tabata Okayama University, Japan
Katsuyuki Takashima Mitsubishi Electric, Japan
Keisuke Takemori KDDI R&D Labs., Japan
Shoko Yonezawa AIST, Japan

Related Resources

DACS 2018   Data Analytics for Cyber Security Workshop
IJRAP 2017   International Journal of Recent advances in Physics
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ACNS 2018   Applied Cryptography and Network Security
BioSTAR 2018   3rd International Workshop on Bio-inspired Security, Trust, Assurance and Resilience
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ICC 5G-Security 2018   The First IEEE Workshop on 5G Wireless Security - ICC 2018
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
CCSEA 2018   8th International Conference on Computer Science, Engineering and Applications
DISSECT 2018   IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies