| |||||||||||||||
EAI AC3 2021 : EAI International Conference on Applied Cryptography in Computer and Communications | |||||||||||||||
Link: http://ac3-conference.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Scope
AC3 is an annual conference focusing on the area of applied cryptography in computer and communication systems. The conference encourages submissions on all technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices. The conference also encourages submissions on using cryptography to solve real-world problems in Internet of things, cyber-physical systems, edge computing, cloud computing, data science, information-centric networking, etc. *** Topics The works that will be presented at the conference will focus on, but not limited to, the following topics: - Symmetric cryptographic primitives - Public key cryptography - Lightweight cryptography - Post-quantum cryptography - Cryptanalysis - Searchable encryption - Authentication and identification protocols - Cryptographic privacy protection techniques - Blockchain cryptographic primitives - Cryptographic protocol implementation - Cryptographic standards and legal regulations - Side channels and preventions - Cryptographic key attacks and defense - Cryptographic hardware - Applied cryptography in IoTs/CPS - Applied cryptography in edge computing - Applied cryptography in cloud computing - Applied cryptography in information-centric networking - Applied cryptography in software-defined networking - Applied cryptography in big data and artificial intelligence *** Publication All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library. Proceedings will be submitted for inclusion in leading indexing services, Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL). Selected papers, after being extended, will be recommended to be published in a special issue of Cybersecurity. Additional publication opportunities: - EAI Transactions series (Open Access) - EAI/Springer Innovations in Communications and Computing Book Series |
|