| |||||||||||||
Inscrypt 2015 : 11th International Conference on Information Security and CryptologyConference Series : Information Security and Cryptology | |||||||||||||
Link: http://inscrypt.cn/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
CALL FOR PAPERS
11th International Conference on Information Security and Cryptology Inscrypt 2015 November 1 - 3, 2015, Beijing, China http://www.inscrypt.cn/ --- In Cooperation with IACR --- The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015) will be held in Beijing, from November 1 to 3, 2015, co-organized by the State Key Laboratory of Information Security, the Chinese Association for Cryptologic Research of China, and In Cooperation with IACR. It is an annual conference targeting the top research results in the related area. Topics of interest encompass research advances in ALL areas of information security, cryptology, and their applications. Inscrypt 2015 seeks high-quality research contributions in the form of well-developed papers, and two successive tracks for crypto and security respectively will be organized. The conference proceedings will be published by Springer-Verlag in LNCS series. Papers ====== Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications for either crypto track or security track. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to: Crypto Track: ------------- Foundations of Cryptography Provable Security Sequences and Boolean Functions Secure Multiparty Computation Symmetric Key Cryptosystems Public Key Cryptosystems Implementation of Cryptosystems Hash Functions and MACs Block Cipher Modes of Operation Key Management and Key Recovery Security Protocols and Their Analysis Information Hiding and Watermarking Secure Computation Outsourcing Functional Computation and Verifiable Computation Obfuscation Leakage Resilient Cryptography Security Track: --------------- Access Control Authentication and Authorization Biometric Security Distributed System Security Electronic Commerce Security Intrusion Detection Network Security Security Modeling and Architectures Intellectual Property Protection Mobile System Security Operating System Security Risk Evaluation and Security Certification Prevention and Detection of Malicious Codes Privacy Enhancing Technologies Genomic Privacy and SDN Security Big Data and Cloud Security Instruction for Authors ======================= Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to http://www.easychair.org/conferences/?conf=inscrypt2015 . Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format. More information can be found at conference web site http://www.inscrypt.cn/. Important Dates =============== Deadline for Submission: August 10, 2015 Notification of Acceptance: October 8, 2015 Pre-proceedings version deadline: October 15, 2015 Proceedings version deadline: December 3, 2015 Conference Chair: ================= Dan Meng, Institute of Information Engineering, CAS, China Jianying Zhou, Institute for Infocomm Research, Singapore Program Co-Chairs: ================== Dongdai Lin, Institute of Information Engineering, CAS, China Xiaofeng Wang, Indiana University at Bloomington, USA Moti Yung, Google Inc. & Columbia University, USA Local Orgranizing committee Co-Chairs: ===================================== Chuankun Wu, Institute of Information Engineering, CAS, China Yanping Yu, Chinese Association for Cryptologic Research, China Publicity Chair =============== Kai Chen, SKLOIS, Institute of Information Engineering, CAS, China Technical Program Committee =========================== Erman Ayday Bilkent University, Turkey Elisa Bertino Purdue University, USA Ioana Boureanu Akamai Technologies Limited, UK Kai Chen Institute of Information Engineering, CAS, China Kefei Chen Hangzhou Normal University, China Liqun Chen Hewlett-Packard Laboratories, UK Xiaofeng Chen Xidian University, China Sherman S. M. Chow Chinese University of Hong Kong, China Nicolas Courtois University College London, UK Laszlo Csirmaz Central European University, Hungary Jintai Ding University of Cincinnati, USA Cunsheng Ding Hong Kong University of Science and Technology, China Yingfei Dong University of Hawaii, USA Chun-I Fan National Sun Yat-sen University, Taiwan Debin Gao Singapore Management University, Singapore Dawu Gu Shanghai Jiao Tong University, China Huaqun Guo Institute for Infocomm Research, Singapore Jian Guo Nanyang Technological University, Singapore Weili Han Fudan University, China Feng Hao Newcastle University, UK Tor Helleseth University of Bergen, Norway Matt Henricksen Institute For Infocomm Research, Singapore Lei Hu Institute of Information Engineering, CAS, China Xinyi Huang Fujian Normal University, China Mehmet Sabir Kiraz TUBITAK BILGEM, Turkey Ninghui Li Purdue University, USA Yingjiu Li Singapore Management University, Singapore Tieyan Li Huawei, Singapore Xin Li John Hopkins University, USA Peng Liu The Pennsylvania State University, USA Yang Liu Nanyang Technological University, Singapore Di Ma University of Michigan-Dearborn, USA Subhamoy Maitra Indian Statistical Institute, India Florian Mendel Graz University of Technology, Austria Atsuko Miyaji Japan Advanced Institute of Science and Technology, Japan Maria Naya-Plasencia Inria, France Giuseppe Persiano Universita di Salerno, Italy Thomas Peters Ecole Normale Superieure, France Josef Pieprzyk Queensland University of Technology, Australia Bertram Poettering Ruhr University Bochum, Germany Zhiyun Qian University of California, Riverside, USA Longjiang Qu National University of Defense Technology, China Giovanni Russello The University of Auckland, New Zealand Seungwon Shin KAIST, Korea Willy Susilo University of Wollongong, Australia Shaohua Tang South China University of Technology, China Vijay Varadharajan Macquarie University, Australia Cong Wang City University of Hong Kong, China Meiqin Wang Shandong University, China Jian Weng Jinan University, China Wenling Wu Institute of Software, CAS, China Shouhuai Xu University of Texas at San Antonio, USA Wenyuan Xu Zhejiang University, China Danfeng Yao Virginia Tech, USA Ting Yu Qatar Computing Research Institute, Qatar Yu Yu Shanghai Jiao Tong University, China Kehuan Zhang Chinese University of Hong Kong, China Fangguo Zhang Sun Yat-sen University, China Yuliang Zheng University of Alabama at Birmingham, USA Vassilis Zikas ETH Zurich Cliff Zou University of Central Florida, USA Conference email ================ Inscrypt@iie.ac.cn |
|