posted by user: cedricvanrompay || 4431 views || tracked by 15 users: [display]

ACNS 2018 : Applied Cryptography and Network Security


Conference Series : Applied Cryptography and Network Security
When Jul 2, 2018 - Jul 4, 2018
Where Leuven, Belgium
Submission Deadline Jan 26, 2018
Notification Due Mar 31, 2018
Categories    cryptography   security

Call For Papers

The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. The conference will be organised by the Computer Security and Industrial Cryptography (COSIC) group at KU Leuven. The proceedings of ACNS 2018 will be published by Springer.

ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.

The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include but are not limited to:

Access control
Applied cryptography
Automated security analysis
Biometric security/privacy
Block chain and cryptocurrencies
Cloud security/privacy
Complex systems security
Critical infrastructure
Cryptographic primitives
Cryptographic protocols
Data protection
Database/system security
Digital rights management
Email, app and web security
Future Internet security
Human factors in security
Identity management
IP protection
Internet fraud, cybercrime
Internet-of-Things security
Intrusion detection
Key management
Mobile/wireless/5G security
Network security protocols
Privacy/anonymity, PETs
Security in e-commerce
Security in grid systems
Security in P2P systems
Security/privacy metrics
Trust management
Ubiquitous security/privacy
Usability in security/privacy

Instructions for authors: Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references. Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see with a page limit of 18 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility will be clarified with authors of accepted papers following the notification). Papers should be submitted electronically in PDF format through EasyChair via Submissions not meeting the submission guidelines risk rejection without consideration of their merits. It is strongly encouraged that submissions be processed in LaTeX.

Conference organization

General chair:
Bart Preneel (KU Leuven, Belgium)
Program co-chairs:
Bart Preneel (KU Leuven, Belgium)
Frederik Vercauteren (KU Leuven, Belgium)
Program committee:
Michel Abdalla (ENS and CNRS, France)
Masayuki Abe (NTT, Japan)
Elli Androulaki (IBM Research, Switzerland)
Alex Biryukov (University of Luxembourg, Luxembourg)
Marina Blanton (University at Buffalo, The State University of New York, USA)
Jan Camenisch (IBM Research, Switzerland)
Liqun Chen (University of Surrey, UK)
Chen-Mou Cheng (National Taiwan University, Taiwan)
Naccache David (ENS, France)
Dieter Gollmann (Hamburg University of Technology, Germany)
Peter Gutmann (University of Auckland, New Zealand)
Shai Halevi (IBM Research, USA)
Goichiro Hanaoka (AIST, Japan)
Amir Herzberg (University of Connecticut, USA)
Tibor Jager (Paderborn University, Germany)
Marc Joye (NXP Semiconductors, USA)
Aniket Kate (Purdue University, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Florian Kerschbaum (University of Waterloo, Canada)
Aggelos Kiayias (University of Edinburgh, UK)
Kwangjo Kim (KAIST, Korea)
Kaoru Kurosawa (Ibaraki University, Japan)
Ralf Kusters (University of Stuttgart, Germany)
Xuejia Lai (Shanghai Jiaotong University, China)
Benoit Libert (CNRS and ENS de Lyon, France)
Dongdai Lin (SKLOIS, Chinese Academy of Sciences, China)
Michael Locasto (SRI International, USA)
Javier Lopez (University of Malaga, Spain)
Mark Manulis (University of Surrey, UK)
Atefeh Mashatan (Ryerson University, Canada)
Bart Mennink (Radboud University, The Netherlands)
Atsuko Miyaji (JAIST, Japan)
Refik Molva (Eurecom, France)
Michael Naehrig (Microsoft Research, USA)
Miyako Ohkubo (NICT, Japan)
Panos Papadimitratos (KTH Royal Institute of Technology, Sweden)
Thomas Peyrin (Nanyang Technological University, Singapore)
Josef Pieprzyk (QUT, Australia)
Benny Pinkas (Bar Ilan University, Israel)
Bart Preneel (KU Leuven, Belgium)
Christian Rechberger (TU Graz, Austria)
Matt Robshaw (Impinj, USA)
Ahmad Sadeghi (TU Darmstadt, Germany)
Yu Sasaki (NTT Secure Platform Laboratories, Japan)
Willy Susilo (University of Wollongong, Australia)
Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan)
Damien Vergnaud (ENS, France)
Ivan Visconti (University of Salerno, Italy)
Frederik Vercauteren (KU Leuven, Belgium)
Avishai Wool (Tel Aviv University, Israel)
Moti Yung (Snapchat and Colombia University, USA)
Jianying Zhou (Singapore University of Technology and Design, Singapore)

Related Resources

ACNS 2019   International Conference on Applied Cryptography and Network Security
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
DSN 2019   Dependable Systems and Networks
ITCE 2019   The International Conference on Innovative Trends in Computer Engineering
NECO 2018   7th International Conference of Networks and Communications
SeTM 2019   Security and Trust in Mobile Network 2019
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IEEE S&P 2019   IEEE Symposium on Security and Privacy
IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)