posted by user: cedricvanrompay || 7239 views || tracked by 14 users: [display]

ACNS 2018 : Applied Cryptography and Network Security


Conference Series : Applied Cryptography and Network Security
When Jul 2, 2018 - Jul 4, 2018
Where Leuven, Belgium
Submission Deadline Jan 26, 2018
Notification Due Mar 31, 2018
Categories    cryptography   security

Call For Papers

The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. The conference will be organised by the Computer Security and Industrial Cryptography (COSIC) group at KU Leuven. The proceedings of ACNS 2018 will be published by Springer.

ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.

The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include but are not limited to:

Access control
Applied cryptography
Automated security analysis
Biometric security/privacy
Block chain and cryptocurrencies
Cloud security/privacy
Complex systems security
Critical infrastructure
Cryptographic primitives
Cryptographic protocols
Data protection
Database/system security
Digital rights management
Email, app and web security
Future Internet security
Human factors in security
Identity management
IP protection
Internet fraud, cybercrime
Internet-of-Things security
Intrusion detection
Key management
Mobile/wireless/5G security
Network security protocols
Privacy/anonymity, PETs
Security in e-commerce
Security in grid systems
Security in P2P systems
Security/privacy metrics
Trust management
Ubiquitous security/privacy
Usability in security/privacy

Instructions for authors: Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references. Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see with a page limit of 18 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility will be clarified with authors of accepted papers following the notification). Papers should be submitted electronically in PDF format through EasyChair via Submissions not meeting the submission guidelines risk rejection without consideration of their merits. It is strongly encouraged that submissions be processed in LaTeX.

Conference organization

General chair:
Bart Preneel (KU Leuven, Belgium)
Program co-chairs:
Bart Preneel (KU Leuven, Belgium)
Frederik Vercauteren (KU Leuven, Belgium)
Program committee:
Michel Abdalla (ENS and CNRS, France)
Masayuki Abe (NTT, Japan)
Elli Androulaki (IBM Research, Switzerland)
Alex Biryukov (University of Luxembourg, Luxembourg)
Marina Blanton (University at Buffalo, The State University of New York, USA)
Jan Camenisch (IBM Research, Switzerland)
Liqun Chen (University of Surrey, UK)
Chen-Mou Cheng (National Taiwan University, Taiwan)
Naccache David (ENS, France)
Dieter Gollmann (Hamburg University of Technology, Germany)
Peter Gutmann (University of Auckland, New Zealand)
Shai Halevi (IBM Research, USA)
Goichiro Hanaoka (AIST, Japan)
Amir Herzberg (University of Connecticut, USA)
Tibor Jager (Paderborn University, Germany)
Marc Joye (NXP Semiconductors, USA)
Aniket Kate (Purdue University, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Florian Kerschbaum (University of Waterloo, Canada)
Aggelos Kiayias (University of Edinburgh, UK)
Kwangjo Kim (KAIST, Korea)
Kaoru Kurosawa (Ibaraki University, Japan)
Ralf Kusters (University of Stuttgart, Germany)
Xuejia Lai (Shanghai Jiaotong University, China)
Benoit Libert (CNRS and ENS de Lyon, France)
Dongdai Lin (SKLOIS, Chinese Academy of Sciences, China)
Michael Locasto (SRI International, USA)
Javier Lopez (University of Malaga, Spain)
Mark Manulis (University of Surrey, UK)
Atefeh Mashatan (Ryerson University, Canada)
Bart Mennink (Radboud University, The Netherlands)
Atsuko Miyaji (JAIST, Japan)
Refik Molva (Eurecom, France)
Michael Naehrig (Microsoft Research, USA)
Miyako Ohkubo (NICT, Japan)
Panos Papadimitratos (KTH Royal Institute of Technology, Sweden)
Thomas Peyrin (Nanyang Technological University, Singapore)
Josef Pieprzyk (QUT, Australia)
Benny Pinkas (Bar Ilan University, Israel)
Bart Preneel (KU Leuven, Belgium)
Christian Rechberger (TU Graz, Austria)
Matt Robshaw (Impinj, USA)
Ahmad Sadeghi (TU Darmstadt, Germany)
Yu Sasaki (NTT Secure Platform Laboratories, Japan)
Willy Susilo (University of Wollongong, Australia)
Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan)
Damien Vergnaud (ENS, France)
Ivan Visconti (University of Salerno, Italy)
Frederik Vercauteren (KU Leuven, Belgium)
Avishai Wool (Tel Aviv University, Israel)
Moti Yung (Snapchat and Colombia University, USA)
Jianying Zhou (Singapore University of Technology and Design, Singapore)

Related Resources

ACNS 2022   Applied Cryptography and Network Security
CST 2021   8th International Conference on Foundations of Computer Science & Technology
IJCIS 2021   International Journal on Cryptography and Information Security
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
BIOM 2021   International Conference on Big Data, IoT and Machine Learning
CyberHunt 2021   IEEE Workshop on Cyber Threat Intelligence and Hunting with AI
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
IEEE Network 2021   IEEE Network Magazine Special Issue Call for Paper: Trust, Security and Privacy of 6G
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
IEEE CSP--EI Compendex, Scopus 2022   2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)--EI Compendex, Scopus