posted by user: cedricvanrompay || 570 views || tracked by 10 users: [display]

ACNS 2018 : Applied Cryptography and Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Applied Cryptography and Network Security
 
Link: https://www.cosic.esat.kuleuven.be/events/acns2018/
 
When Jul 2, 2018 - Jul 4, 2018
Where Leuven, Belgium
Submission Deadline Jan 26, 2018
Notification Due Mar 31, 2018
Categories    cryptography   security
 

Call For Papers

The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. The conference will be organised by the Computer Security and Industrial Cryptography (COSIC) group at KU Leuven. The proceedings of ACNS 2018 will be published by Springer.

ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.

The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include but are not limited to:

Access control
Applied cryptography
Automated security analysis
Biometric security/privacy
Block chain and cryptocurrencies
Cloud security/privacy
Complex systems security
Critical infrastructure
Cryptographic primitives
Cryptographic protocols
Data protection
Database/system security
Digital rights management
Email, app and web security
Future Internet security
Human factors in security
Identity management
IP protection
Internet fraud, cybercrime
Internet-of-Things security
Intrusion detection
Key management
Malware
Mobile/wireless/5G security
Network security protocols
Privacy/anonymity, PETs
Security in e-commerce
Security in grid systems
Security in P2P systems
Security/privacy metrics
Trust management
Ubiquitous security/privacy
Usability in security/privacy

Instructions for authors: Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references. Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see http://www.springeronline.com/lncs) with a page limit of 18 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility will be clarified with authors of accepted papers following the notification). Papers should be submitted electronically in PDF format through EasyChair via https://easychair.org/conferences/?conf=acns2018. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. It is strongly encouraged that submissions be processed in LaTeX.

Conference organization

General chair:
Bart Preneel (KU Leuven, Belgium)
Program co-chairs:
Bart Preneel (KU Leuven, Belgium)
Frederik Vercauteren (KU Leuven, Belgium)
Program committee:
Michel Abdalla (ENS and CNRS, France)
Masayuki Abe (NTT, Japan)
Elli Androulaki (IBM Research, Switzerland)
Alex Biryukov (University of Luxembourg, Luxembourg)
Marina Blanton (University at Buffalo, The State University of New York, USA)
Jan Camenisch (IBM Research, Switzerland)
Liqun Chen (University of Surrey, UK)
Chen-Mou Cheng (National Taiwan University, Taiwan)
Naccache David (ENS, France)
Dieter Gollmann (Hamburg University of Technology, Germany)
Peter Gutmann (University of Auckland, New Zealand)
Shai Halevi (IBM Research, USA)
Goichiro Hanaoka (AIST, Japan)
Amir Herzberg (University of Connecticut, USA)
Tibor Jager (Paderborn University, Germany)
Marc Joye (NXP Semiconductors, USA)
Aniket Kate (Purdue University, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Florian Kerschbaum (University of Waterloo, Canada)
Aggelos Kiayias (University of Edinburgh, UK)
Kwangjo Kim (KAIST, Korea)
Kaoru Kurosawa (Ibaraki University, Japan)
Ralf Kusters (University of Stuttgart, Germany)
Xuejia Lai (Shanghai Jiaotong University, China)
Benoit Libert (CNRS and ENS de Lyon, France)
Dongdai Lin (SKLOIS, Chinese Academy of Sciences, China)
Michael Locasto (SRI International, USA)
Javier Lopez (University of Malaga, Spain)
Mark Manulis (University of Surrey, UK)
Atefeh Mashatan (Ryerson University, Canada)
Bart Mennink (Radboud University, The Netherlands)
Atsuko Miyaji (JAIST, Japan)
Refik Molva (Eurecom, France)
Michael Naehrig (Microsoft Research, USA)
Miyako Ohkubo (NICT, Japan)
Panos Papadimitratos (KTH Royal Institute of Technology, Sweden)
Thomas Peyrin (Nanyang Technological University, Singapore)
Josef Pieprzyk (QUT, Australia)
Benny Pinkas (Bar Ilan University, Israel)
Bart Preneel (KU Leuven, Belgium)
Christian Rechberger (TU Graz, Austria)
Matt Robshaw (Impinj, USA)
Ahmad Sadeghi (TU Darmstadt, Germany)
Yu Sasaki (NTT Secure Platform Laboratories, Japan)
Willy Susilo (University of Wollongong, Australia)
Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan)
Damien Vergnaud (ENS, France)
Ivan Visconti (University of Salerno, Italy)
Frederik Vercauteren (KU Leuven, Belgium)
Avishai Wool (Tel Aviv University, Israel)
Moti Yung (Snapchat and Colombia University, USA)
Jianying Zhou (Singapore University of Technology and Design, Singapore)

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
IJMSA 2017   International Journal of Modeling, Simulation and Applications
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
SECRYPT 2018   15th International Conference on Security and Cryptography
IJE 2017   International Journal of Education (IJE)
BSidesMunich 2018   BSides Munich 2018 Security Conference
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
CS2 2018   Fifth Workshop on Cryptography and Security in Computing Systems
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus