posted by organizer: C2SI || 8797 views || tracked by 7 users: [display]

C2SI 2019 : 3rd International Conference on Codes, Cryptology and Information Security

FacebookTwitterLinkedInGoogle

Link: http://www.c2si-conference.org
 
When Apr 22, 2019 - Apr 24, 2019
Where Mohammed V University in Rabat
Submission Deadline Nov 30, 2018
Notification Due Jan 20, 2019
Final Version Due Feb 15, 2019
Categories    coding theory   cryptology   security   information
 

Call For Papers

CALL FOR PAPERS
===============

The third International Conference on Codes, Cryptology and Information Security (C2SI-2019) aims to bring together researchers in the fields of coding theory, cryptology and information Security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas.
The focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences in the following fields from academia, government, and industry presenting novel research.


TOPICS OF INTEREST
==================

Areas of interest include, but are not limited to:
Access Control Models
Applied Cryptography
Attacks & Malicious Code
Authentication, Identification
Block & Stream Ciphers
Blockchain Security and Privacy
Boolean Functions
Code-based Cryptography
Coding theory
Cryptanalysis
Cryptographic Algorithms and Primitives
Cryptographic Protocols
Data Protection
Denial of Service Protection
Elliptic-curve cryptography
Embedded System Security
Error correcting codes
Fingerprinting
Formal Methods for Security
Hash Functions
Identity and Security in IoT
Identity-based encryption (IBE)
Information Hiding
Information theory
Intrusion Detection & Prevention
Language-Based Security
Lattice-Based Cryptography
Malware Analysis and Detection
Mobile Agents Security
Mobile Security
Multivariate cryptography
Network Security
Post-Quantum cryptography
Public Key Cryptography
Quantum Cryptology
Random and pseudorandom generators
RFID security
Secure Distributed Computing
Security and Privacy for Big Data
Security and Privacy in the Cloud
Security Architectures
Security in Grid Computing
Security in Social Networks
Security in the Internet of Things
Security Models
Security Policies
Sensor Network Security
Side channel attacks
Signature, Integrity
Smart cards Security
Steganography
Watermarking
Wireless and Mobile Security


PAPER SUBMISSION
================

Submission to C2SI-2019 must be original and not substantially duplicate work that has been published or is simultaneously submitted to a journal or another conference/workshop with proceedings. Papers that contain any form of plagiarism or self-plagiarism will be rejected without reviews. All submissions will be blind-refereed.
All papers must be written in English, complete, intelligible and self-contained within at most 20 pages in Springer's Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. Information about the Springer LNCS format can be found at http://www.springer.de/comp/lncs/authors.html . Supplementary materials that facilitate verification of the results, e.g. source code, proof details, etc., may be appended without a page limit or uploaded as separate files, but reviewers are neither required to read them nor will they be printed in the proceedings. Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references. All submissions must be processed with LaTeX and follow Springer's LNCS format without changing default margins, fonts, fonts size, line spacing etc. Submissions not meeting these guidelines may be rejected without consideration of their merits. Papers must be submitted electronically in PDF format via easychair https://easychair.org/conferences/
At least one author of each accepted paper is required to register with the conference and present the paper. Papers which are not registred will not be included in the Proceeding. All accepted and registred papers will be published in the series LNCS like in C2SI-2015 and C2SI-2017. Proceedings will be available at the conference. Note that any submission to C2SI 2019 implies the full acknowledgment and commitment of the authors to the entire review process.


IMPORTANT DATES
===============

Submission deadline: November 30, 2018, 23:59 GMT
Notification to authors: January 20, 2019
Camera-Ready and Registration: February 15, 2019, 23:59 GMT
Conference: April 22 - 24 , 2019
Social event: April 24 - 27, 2019

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
FSTJ 2024   Food Science and Technology: An International Journal