posted by organizer: glivraga || 13244 views || tracked by 33 users: [display]

CANS 2016 : 15th International Conference on Cryptology and Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Cryptology and Network Security
 
Link: http://cans2016.di.unimi.it/
 
When Nov 14, 2016 - Nov 16, 2016
Where Milan, Italy
Submission Deadline Jul 20, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 18, 2016
Categories    cryptography   network security   security   information security
 

Call For Papers

CALL FOR PAPERS


*** Submission deadline extended to July 20, 2016 - 11:59 p.m. American Samoa time) ***


******************************************************************************
15th International Conference on Cryptology and Network Security (CANS 2016)
Milan (historic area, near Duomo), Italy -- 14-16 November 2016
http://cans2016.di.unimi.it/
******************************************************************************

The International Conference on Cryptology and Network Security (CANS) is a
recognized annual conference, focusing on all aspects of cryptology,
and of data, network, and computer security, attracting cutting-edge
results from world-renowned scientists in the area.
Proceedings of CANS are published in the Lecture Notes in Computer Science
series of Springer.
They are distributed at the conference and are included in all major online databases.

The 15th edition of the conference will be held in Milan, Italy,
in an historic building of the University of Milan (near Duomo).
Earlier editions of CANS were held in Taipei (2001), San Francisco (2002),
Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007),
Hong Kong (2008), Kanazawa (2009), Kuala Lumpur (2010), Sanya (2011),
Darmstadt (2012), Parary (2013), Crete (2014), and Marrakesh (2015).
CANS 2016 is held in cooperation with the International Association
of Cryptologic Research (IACR).


OVERVIEW
Papers offering novel research contributions are solicited for submission
to the 15th International Conference on Cryptology and Network Security
(CANS 2016). The focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of papers
suggesting novel paradigms, original directions, or non-traditional
perspectives.

Submitted papers must not substantially overlap with papers that have
been published or that are submitted in parallel to a journal or a
conference with formally published proceedings.


TOPICS OF INTEREST
- Access Control
- Adware, Malware, and Spyware
- Anonymity & Pseudonymity
- Applied cryptography
- Attacks & Malicious Code
- Authentication, Identification
- Biometrics
- Block & Stream Ciphers
- Cryptographic Algorithms
- Cryptographic Protocols
- Cyberphysical Security
- Data and Application Security
- Data and Computation Integrity
- Data Protection
- Denial of Service Protection
- Distributed Systems Security
- Embedded System Security
- Formal Methods for Security
- Hash Functions
- Identity Management
- Language-Based Security
- (Future) Internet Security
- Key Management
- Mobile Security
- Multicast Security
- Network Security
- Peer-to-Peer Security
- Privacy
- Public Key Cryptography
- Security Architectures
- Security and Privacy for Big Data
- Security and Privacy in the Cloud
- Security in Content Delivery Networks
- Security in Crowdsourcing
- Security in Grid Computing
- Security in the Internet of Things
- Security in Location Services
- Security in Pervasive and Ubiquitous Systems
- Security in Social Networks
- Security Metrics
- Security Models
- Security Policies
- Sensor Network Security
- Spam & SPIT Protection
- Spyware Analysis and Detection
- Trust Management
- Usable Security
- Virtual Private Networks
- Wireless and Mobile Security


INSTRUCTIONS FOR AUTHORS
The submission should be at most 16 pages.
The conference will also consider short submissions of up to 8 pages for
results that are preliminary or that simply require few pages to describe.
Authors of regular submitted papers will indicate at the time of submission
whether they would like their paper to also be considered for publication as a
short paper (8 proceedings pages).
Papers must be submitted only electronically.
The electronic submission site is available at:
https://easychair.org/conferences/?conf=cans2016

Submissions must be anonymous (no author names, affiliations,
acknowledgments, obvious references). At least one author of every
accepted paper must register to the conference by the early registration
deadline indicated by the organizers. Authors have to present their own
paper. Papers without a registered author will be removed from the
proceedings.

Accepted papers will be published in Springer's Lecture Notes in Computer
Science (LNCS) and will be available at the conference. Papers should
follow the formatting instructions of the Springer LNCS Style
(http://www.springer.com/lncs), at the time of submission.


IMPORTANT DATES
Deadline for paper submission: July 20, 2016 (11:59 p.m. American Samoa time) [extended]
Notification to authors: September 10, 2016
Camera-ready version: September 18, 2016


GENERAL CHAIR
P. Samarati, Universita' degli Studi di Milano, Italy


PROGRAM COMMITTEE CHAIRS
S. Foresti, Universita' degli Studi di Milano, Italy
G. Persiano, Universita' di Salerno, Italy


PROGRAM COMMITTEE MEMBERS
C. Blundo, Universita' degli Studi di Salerno, Italy
N. Chandran, Microsoft Research, India
Y. Chen, Stevens Institute of Technology, USA
S. Chow, Chinese University of Hong Kong, Hong Kong
S. De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
A. De Caro, IBM Research, Zurich, Switzerland
Y. Desmedt, The University of Texas at Dallas, USA
N. Fazio, City University of New York, USA
G. Fuchsbauer, Ecole normale supérieure, France
R. Gennaro, City University of New York USA
A. Herzberg, Bar Ilan University, Israel
V. Iovino, University of Luxembourg, Luxembourg
F. Kerschbaum, SAP, Germany
A. Kiayias, University of Athens, Greece
A. Levi, Sabanci University, Turkey
M. Li, University of Arizona, USA
D. Lin, Chinese Academy of Sciences, China
P. Liu, The Pennsylvania State University, USA
J. Lopez, University of Malaga, Spain
S. Lu, Stealth Software Technologies, Inc., USA
E. Markatos, University of Crete, Greece
A. Miyaji, JAIST, Japan
R. Molva, Eurecom, France
Y. Mu, University of Wollongong, Australia
G. Neven, IBM Research, Zurich, Switzerland
S. Nikova, KU Leuven, Belgium
E. Orsini, University of Bristol, UK
S. Paraboschi, Universita' di Bergamo, Italy
G. Pelosi, Politecnico di Milano, Italy
B. Pinkas, Bar Ilan University, Israel
N. Saxena, University of Alabama at Birmingham, USA
A. Schaad, Huawei Research, Germany
D. Schroeder, Saarland University, Germany
P. Schwabe, Radboud University, The Netherlands
W. Susilo, University of Wollongong, Australia
Q. Tang, University of Luxembourg, Luxembourg
K. Takashima, Mitsubishi Electric, Japan
M. Yu, University of Texas at San Antonio, USA
H. Wang, Nanyang Technological University, Singapore


STEERING COMMITTEE
Y. Desmedt, University of Texas (Dallas), USA
J. A. Garay, Yahoo! Labs, USA
A. Herzberg, Bar-Ilan University, Israel
Y. Mu, University of Wollongong, Australia
D. Pointcheval, CNRS & ENS Paris, France
H. Wang, Nanyang Technical University, Singapore


PUBLICITY CHAIR
G. Livraga, Universita' degli Studi di Milano, Italy



If you have any question, please contact the organizers at cans2016@unimi.it

Related Resources

ORAJ 2016   Operations Research and Applications: An International Journal
IJISS 2016   International Journal of Information Security Science (IJISS)
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IJMSA 2016   International Journal of Modelling, Simulation and Applications
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
FC 2017   Financial Cryptography and Data Security 2017
ICCSN 2017   9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)-JA, Ei and IEEE Xplore
ICCNS 2016   2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus
PAM 2017   Passive and Active Measurement Conference