| |||||||||||||||
EAI AC3 2022 : 2nd EAI International Conference on Applied Cryptography in Computer and Communications | |||||||||||||||
Link: https://ac3-conference.eai-conferences.org/2022/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Scope
The AC3 conference intends to bring together researchers and practitioners from all areas of applied cryptography in computer and communication systems. The conference encourages submissions on all technical aspects of applied cryptography, including but not limited to cryptographic algorithms, protocols, implementations, standards and practices, and applications of cryptography in computer, information, and system security. We encourage submissions on the utilization of cryptographic technologies to solve security problems in real-world systems, including cloud services, the Internet of Things, cyber-physical systems, distributed systems, edge computing, information-centric networks, databases, data centers, etc. *** Publication All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library. Proceedings will be submitted for inclusion in leading indexing services, Ei Compendex, Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL). Authors of selected papers will be invited to submit an extended version to: - Mobile Networks and Applications – Springer (SCI-E, IF=2.602) - EAI Endorsed Transactions on Scalable Information Systems (Open Access) – indexed in ESCI & Ei Compendex All accepted authors are eligible to submit an extended version in a fast track of: - EAI Endorsed Transactions on Security and Safety (Open Access) Additional publication opportunities: - EAI/Springer Innovations in Communications and Computing Book Series (titles in this series are indexed in Ei Compendex, Web of Science & Scopus) *** Topics Authenticated Encryption Hash Functions and MACs Provable Security Public Key Encryption Digital Signatures Key Exchange/Agreement Searchable Encryption Key Management Cryptographic Protocols Multiparty Secure Computation Financial Cryptography Cryptographic Implementations Post-Quantum Cryptography Side Channel Attacks and Prevention Anonymity and Privacy-Enhancing Authentication and Identity Management Data Protection Database Security Digital Rights Management Trust Management Trusted Hardware and Cryptographic Hardware Applied Cryptography in Blockchain Applied Cryptography in IoT/CPS Applied Cryptography in Clouds Applied Cryptography in Mobile Systems Applied Cryptography in VANET Applied Cryptography in Information-Centric Networks Applied Cryptography in Edge Computing Applied cryptography in Big Data and Artificial Intelligence *** Honorary Chair Yongbiao Liu - Jinling Institute of Technology, China General Chairs Bo Luo - The University of Kansas, USA Zheng Zhang - Jinling Institute of Technology, China Technical Program Committee Chairs Jingqiang Lin - University of Science and Technology of China, China Qiang Tang - The University of Sydney, Australia *** This event is organized by EAI (www.eai.eu). EAI – European Alliance for Innovation is a non-profit organization and a professional community established in cooperation with the European Commission to empower global research and innovation, and to promote cooperation between European and International ICT communities. |
|