posted by organizer: C2SI || 616 views || tracked by 2 users: [display]

C2SI 2019 : 3rd International Conference on Codes, Cryptology and Information Security

FacebookTwitterLinkedInGoogle

Link: http://www.c2si-conference.org
 
When Apr 22, 2019 - Apr 24, 2019
Where Mohammed V University in Rabat
Submission Deadline Nov 30, 2018
Notification Due Jan 20, 2019
Final Version Due Feb 15, 2019
Categories    coding theory   cryptology   security   information
 

Call For Papers

CALL FOR PAPERS
===============

The third International Conference on Codes, Cryptology and Information Security (C2SI-2019) aims to bring together researchers in the fields of coding theory, cryptology and information Security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas.
The focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences in the following fields from academia, government, and industry presenting novel research.


TOPICS OF INTEREST
==================

Areas of interest include, but are not limited to:
Access Control Models
Applied Cryptography
Attacks & Malicious Code
Authentication, Identification
Block & Stream Ciphers
Blockchain Security and Privacy
Boolean Functions
Code-based Cryptography
Coding theory
Cryptanalysis
Cryptographic Algorithms and Primitives
Cryptographic Protocols
Data Protection
Denial of Service Protection
Elliptic-curve cryptography
Embedded System Security
Error correcting codes
Fingerprinting
Formal Methods for Security
Hash Functions
Identity and Security in IoT
Identity-based encryption (IBE)
Information Hiding
Information theory
Intrusion Detection & Prevention
Language-Based Security
Lattice-Based Cryptography
Malware Analysis and Detection
Mobile Agents Security
Mobile Security
Multivariate cryptography
Network Security
Post-Quantum cryptography
Public Key Cryptography
Quantum Cryptology
Random and pseudorandom generators
RFID security
Secure Distributed Computing
Security and Privacy for Big Data
Security and Privacy in the Cloud
Security Architectures
Security in Grid Computing
Security in Social Networks
Security in the Internet of Things
Security Models
Security Policies
Sensor Network Security
Side channel attacks
Signature, Integrity
Smart cards Security
Steganography
Watermarking
Wireless and Mobile Security


PAPER SUBMISSION
================

Submission to C2SI-2019 must be original and not substantially duplicate work that has been published or is simultaneously submitted to a journal or another conference/workshop with proceedings. Papers that contain any form of plagiarism or self-plagiarism will be rejected without reviews. All submissions will be blind-refereed.
All papers must be written in English, complete, intelligible and self-contained within at most 20 pages in Springer's Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. Information about the Springer LNCS format can be found at http://www.springer.de/comp/lncs/authors.html . Supplementary materials that facilitate verification of the results, e.g. source code, proof details, etc., may be appended without a page limit or uploaded as separate files, but reviewers are neither required to read them nor will they be printed in the proceedings. Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references. All submissions must be processed with LaTeX and follow Springer's LNCS format without changing default margins, fonts, fonts size, line spacing etc. Submissions not meeting these guidelines may be rejected without consideration of their merits. Papers must be submitted electronically in PDF format via easychair https://easychair.org/conferences/
At least one author of each accepted paper is required to register with the conference and present the paper. Papers which are not registred will not be included in the Proceeding. All accepted and registred papers will be published in the series LNCS like in C2SI-2015 and C2SI-2017. Proceedings will be available at the conference. Note that any submission to C2SI 2019 implies the full acknowledgment and commitment of the authors to the entire review process.


IMPORTANT DATES
===============

Submission deadline: November 30, 2018, 23:59 GMT
Notification to authors: January 20, 2019
Camera-Ready and Registration: February 15, 2019, 23:59 GMT
Conference: April 22 - 24 , 2019
Social event: April 24 - 27, 2019

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
SECITC 2018   11th International Conference on Security for Information Technology and Communications
IJIBM 2019   Call For Papers - International Journal of Information, Business and Management
IJAB 2018   International Journal of Advances in Biology
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
IJGTT 2018   International Journal of Game Theory and Technology
ACM--ICISDM--Ei and Scopus 2019   ACM--2019 3rd International Conference on Information System and Data Mining (ICISDM 2019)--Ei Compendex and Scopus
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
CRC-Botnets 2018   Botnets: Architectures, Countermeasures, and Challenges