posted by user: ChickenRun || 2647 views || tracked by 2 users: [display]

ICITS 2013 : The 7th International Conference on Information Theoretic Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Theoretic Security
 
Link: http://www.spms.ntu.edu.sg/mas/conference/icits2013/
 
When Nov 28, 2013 - Nov 30, 2013
Where Singapore
Submission Deadline Jul 12, 2013
Notification Due Aug 30, 2013
Final Version Due Sep 20, 2013
 

Call For Papers

This is the seventh in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptology. Papers on all technical aspects of information-theoretic security and quantum information-theoretic security are solicited for submission to ICITS 2013. Areas of interest include, but are not restricted to:

Unconditional security
Quantum cryptography
Authentication codes
Wiretap channels
Randomness extraction
Codes and cryptography
Lattices and cryptography
Secret sharing
Multiparty Computation
Bounded storage model
Oblivious transfer
Nonlocality and nonsignaling
Quantum information theory
Network coding security
Physical models and assumptions
Physical layer security
Important Dates

Conference Track submission deadline: Friday, July 5, 2013, 13.00 GMT Friday, July 12, 2013, 13.00 GMT
Conference Track notification: Friday, August 30, 2013
Proceedings version: Friday, September 20, 2013

Workshop Track submission deadline: Friday, August 2, 2013, 13.00 GMT
Workshop Track notification: Thursday, September 19, 2013

ICITS 2013 takes place just before Asiacrypt 2013 (December 1–5, Bangalore, India)
Two Tracks, Conference and Workshop

As in the previous edition of the conference, two types of contributed presentations will take place in ICITS 2013. The Conference Track will act as a traditional conference, consisting of original papers with published proceedings. The Workshop Track will operate more like an informal workshop, with papers that have appeared elsewhere or that consist of work in progress.

Conference Track (with proceedings) Submissions to this track must be original papers that have not previously appeared in published form. Accepted papers will be presented at the conference and will appear in the conference proceedings, which will be published by Springer in the Lecture Notes in Computer Science series.

Workshop Track (no proceedings) To encourage presentation of work form a variety of fields, especially those where conference publication is unusual or makes journal publication difficult, “work- shop track” papers are also solicited. Accepted papers will be presented at the conference, but will not appear in the proceedings. Submissions to this track that have previously appeared or are currently submitted elsewhere are acceptable, as long as they first appeared after January 1, 2012. Papers that describe work in progress are also welcome. The same standards of quality will apply to conference and workshop papers.

It is not possible to submit the same work for consideration in both tracks.

Related Resources

ICIIT--EI 2026   2026 11th International Conference on Intelligent Information Technology (ICIIT 2026)
ICIEE--EI 2026   2026 15th International Conference on Information and Electronics Engineering (ICIEE 2026)
Springer ICIM 2026   Springer--2026 the 12th International Conference on Information Management (ICIM 2026)
IVSP 2026   2026 8th International Conference on Image, Video and Signal Processing (IVSP 2026)
SecITC 2025   The 18th International Conference on Security for Information Technology and Communications
APDSP 2026   2026 10th Asia-Pacific Digital Signal Processing Conference (APDSP 2026)
ICCGV--EI 2026   2026 9th International Conference on Computer Graphics and Virtuality (ICCGV 2026)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
Ei/Scopus-CCNML 2025   2025 5th International Conference on Communications, Networking and Machine Learning (CCNML 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust