posted by user: yimu || 10247 views || tracked by 5 users: [display]

CANS 2019 2019 : The 18th International Conference on Cryptology And Network Security

FacebookTwitterLinkedInGoogle

Link: http://cans2019.cn
 
When Oct 25, 2019 - Oct 27, 2019
Where Fuzhou, China
Submission Deadline May 6, 2019
Notification Due Jul 8, 2019
Final Version Due Aug 5, 2019
Categories    cryptology   information security   network security
 

Call For Papers

The International Conference on Cryptology And Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting cutting-edge results from world-renowned scientists in the area. CANS 2019 will be held in Fuzhou (China) in collaboration with the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University. Earlier editions were held in Taipei ('01), San Francisco ('02), Miami ('03), Xiamen ('05), Suzhou ('06), Singapore ('07), Hong Kong ('08), Kanazawa ('09), Kuala Lumpur ('10), Sanya ('11), Darmstadt ('12), Parary ('13), Crete ('14), Marrakesh ('15), Milan ('16), Hong Kong ('17) and Naples ('18). All accepted papers will be presented at the conference and will appear in the conference proceedings, which will be published by Springer in the LNCS series.

High quality papers on unpublished research and implementation experiences are solicited for submission. All papers must be original and not substantially duplicate work that has been published at or is simultaneously submitted to a journal or another conference/workshop with proceedings. All submissions must be written in English, at most 20 pages in Springer's Lecture Notes in Computer Science (LNCS) Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. The introduction should summarise the contributions of the paper at the level understandable for a non-expert reader. The introduction should also explain the relation to related work. At most 4 pages of supplemental material may be provided as well-marked appendices, however, the paper should be intelligible without this material. Submissions must be anonymous (no author names, affiliations, acknowledgments, or obvious references). The conference will also consider short papers, that is, submissions of up to 8 pages (in the LNCS format), for results that are not yet fully fleshed out or that simply require few pages to describe but still make a significant contribution. All submissions must be processed with LaTeX2e according to the instructions given by Springer. Submitted manuscripts must be typeset in plain Springer LNCS format, in particular without changing the font size, margins or line spacing. Submissions not meeting these guidelines may be rejected without consideration of their merits. Papers must be submitted electronically in PDF format via easychair.

https://easychair.org/conferences/?conf=cans2019

Presentation and publication
At least one author of every accepted paper must register to the conference by the early registration deadline indicated by the organizers. Papers without a registered author will be removed from the proceedings. Authors have to present their own paper(s). Proceedings including all accepted papers will be published in LNCS and will be available at the conference.

Areas of interest:

• Access Control
• Anonymity & Pseudonymity
• Applied Cryptography
• Attacks & Malicious Code
• Authentication, Identification
• Biometrics
• Block & Stream Ciphers
• Blockchain Security and Privacy
• Cryptographic Algorithms and Primitivess
• Cryptographic Protocols
• Cyberphysical Security
• Data and Application Security
• Data and Computation Integrity
• Data Protection
• Denial of Service Protection
• Embedded System Security
• Formal Methods for Security
• Hash Functions
• Identity Management
• Key Management
• Language-Based Security
• Malware Analysis and Detection
• Network Security
• Security and Privacy for Big Data
• Security and Privacy in the Cloud
• Security in Content Delivery
• Security in Crowdsourcing
• Security in Grid Computing
• Security in the Internet of Things
• Security in Location Services
• Security in Pervasive Systems
• Security in Social Networks
• Sensor Network Security
• Trust Management
• Usable Security
• Virtual Private Networks
• Wireless and Mobile Security
• Peer-to-Peer Security & Privacy
• Privacy-Enhancing Technologies
• Public Key Cryptography
• Secure Distributed Computing
• Security Architectures
• Security Metrics
• Security Models
• Security Policies

Related Resources

CANS 2021   Cryptology and Network Security
CyberHunt 2021   IEEE Workshop on Cyber Threat Intelligence and Hunting with AI
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
IJNSA 2021   International Journal of Network Security & Its Applications- ERA Listed
BDE--Ei Compendex, Scopus 2022   2022 4th International Conference on Big Data Engineering (BDE 2022)--Ei Compendex, Scopus
IJCCMS 2021   International Journal of Chaos, Control, Modelling and Simulation
IEEE Network 2021   IEEE Network Magazine Special Issue Call for Paper: Trust, Security and Privacy of 6G
ICCNS--ACM, EI, Scopus 2021   2021 the 11th International Conference on Communication and Network Security (ICCNS 2021)--EI Compendex, Scopus