| |||||||||||||
Inscrypt 2013 : The 9th China International Conference on Information Security and CryptologyConference Series : Information Security and Cryptology | |||||||||||||
Link: http://www.inscrypt.cn/2013/Inscrypt_2013.html | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
CALL FOR PAPERS
9th International Conference on Information Security and Cryptology Inscrypt 2013 November 27 - 30, 2013, Guangzhou, China http://www.inscrypt.cn/ The 9th China International Conference on Information Security and Cryptology (INSCRYPT 2013) will be held in Guangzhou from November 27 to November 30, 2013. Inscrypt 2013 seeks high-quality research contributions in the form of well developed papers. Topics of interest encompass research advances in ALL areas of information security, cryptology, and their applications. The conference proceedings will be published by Springer-Verlag in LNCS series. Papers ====== Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to: Access Control Authentication and Authorization Biometric Security Distributed System Security Big Data and Cloud Security Electronic Commerce Security Intrusion Detection Information Hiding and Watermarking Key Management and Key Recovery Network Security Security Protocols and Their Analysis Security Modeling and Architectures Provable Security Secure Multiparty Computation Foundations of Cryptography Secret Key and Public Key Cryptosystems Implementation of Cryptosystems Hash Functions and MACs Block Cipher Modes of Operation Intellectual Property Protection Mobile System Security Operating System Security Risk Evaluation and Security Certification Prevention and Detection of Malicious Codes Instruction for Authors ======================= Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to http://www.easychair.org/conferences/?conf=inscrypt2013. Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format (see http://www.springeronline.com/sgw/cda/frontpage/0,11855,5-164-2-72376-0,00.html). More information can be found at conference web site http://www.inscrypt.cn/. Important Dates =============== Deadline for Submission: August 22, 2013 Notification of Acceptance: October 22, 2013 Pre-proceedings version deadline: November 5, 2013 Proceedings version deadline: December 21, 2013 General Chair: ============== Dingyi Pei Guangzhou University, China Program Co-Chairs: =============== Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, China Shouhuai Xu University of Texas at San Antonio, USA Moti Yung Google Inc. and Columbia University, USA Technical Program Committee =========================== Gouqiang Bai Tsinghua University Elisa Bertino Purdue University Zhenfu Cao Shanghai Jiaotong University Bogdan Carbunar Florida International University Kefei Chen Shanghai Jiaotong University Liqun Chen Hewlett-Packard Laboratories Zhong Chen Peking University Sherman S. M. Chow Chinese University of Hong Kong Ed Dawson Research Director Jintai Ding University of Cincinnati Cunsheng Ding Hong Kong University of Science and Technology Xuhua Ding Singapore Management University Shlomi Dolev Ben-Gurion University of the Negev Yingfei Dong University of Hawaii Lei Hu SKLOIS, Chinese Academy of Sciences, China Miroslaw Kutylowski Wroclaw University of Technology Xuejia Lai Shanghai Jiaotong University Jiangtao Li Intel Corporation Hui Li Xidian University Zhiqiang Lin University of Texas at Dallas Donggang Liu University of Texas at Arlington Peng Liu The Pennsylvania State University Di Ma University of Michigan-Dearborn Subhamoy Maitra Indian Statistical Institute Florian Mendel Graz University of Technology, Austria Atsuko Miyaji Japan Advanced Institute of Science and Technology Yi Mu University of Wollongong, Australia Claudio Orlandi Aarhus University Xinming Ou Kansas State University Ludovic Perret UPMC/LIP6 INRIA/SALSA Giuseppe Persiano Universita' di Salerno Bertram Poettering Royal Holloway, University of London Kouichi Sakurai Kyushu University Nitesh Saxena University of Alabama at Birmingham Jae Hong Seo Myongji University, Youngin, Republic of Korea Claudio Soriente ETH Zürich Wen-Guey Tzeng National Chiao Tung University Yevgeniy Vahlis AT&T Labs Xiaofeng Wang Indiana University, USA Wenling Wu Institute of Software, CAS, China Huaxiong Wang Nanyang Technological University Guilin Wang University of Wollongong Duncan Wong City University of Hong Kong Maozhi Xu Peking University Danfeng Yao Virginia Tech Chung-Huang Yang National Kaohsiung Normal University Yunlei Zhao Fudan University Fangguo Zhang Sun Yat-sen University Rui Zhang Chinese Academy of Sciences, P.R.C. Hong-Sheng Zhou University of Maryland Yuliang Zheng UNC Charlotte Cliff Zou University of Central Florida |
|