posted by organizer: inscrypt || 5400 views || tracked by 5 users: [display]

Inscrypt 2013 : The 9th China International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : Information Security and Cryptology
 
Link: http://www.inscrypt.cn/2013/Inscrypt_2013.html
 
When Nov 27, 2013 - Nov 30, 2013
Where Guangzhou, China
Submission Deadline Aug 22, 2013
Notification Due Oct 22, 2013
Final Version Due Nov 21, 2013
 

Call For Papers

CALL FOR PAPERS
9th International Conference on Information Security and Cryptology
Inscrypt 2013

November 27 - 30, 2013, Guangzhou, China
http://www.inscrypt.cn/

The 9th China International Conference on Information Security and Cryptology
(INSCRYPT 2013) will be held in Guangzhou from November 27 to November 30, 2013.
Inscrypt 2013 seeks high-quality research contributions in the form of well developed
papers. Topics of interest encompass research advances in ALL areas of information
security, cryptology, and their applications. The conference proceedings will be
published by Springer-Verlag in LNCS series.

Papers
======

Authors are invited to submit full papers presenting new research results related
to cryptology, information security and their applications. All submissions must
describe original research that is not published or currently under review by another
conference or journal. Areas of interest include, but are not limited to:

Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Big Data and Cloud Security
Electronic Commerce Security
Intrusion Detection
Information Hiding and Watermarking
Key Management and Key Recovery
Network Security
Security Protocols and Their Analysis
Security Modeling and Architectures
Provable Security
Secure Multiparty Computation
Foundations of Cryptography
Secret Key and Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes

Instruction for Authors
=======================

Conference language is English. All submissions must be anonymous, with no author
names, affiliations, acknowledgments, or obvious references. It should begin with
a title, a short abstract, and a list of key words, and its introduction should
summarize the contributions of the paper at a level appropriate for a non-specialist
reader. The paper should be intelligible and self-contained within 20 pages including
references and appendices and must be submitted electronically to
http://www.easychair.org/conferences/?conf=inscrypt2013.
Submissions not meeting these guidelines risk rejection without consideration of their
merits. It is highly advised to prepare the submissions in the Springer LNCS format
(see http://www.springeronline.com/sgw/cda/frontpage/0,11855,5-164-2-72376-0,00.html).
More information can be found at conference web site http://www.inscrypt.cn/.

Important Dates
===============

Deadline for Submission: August 22, 2013
Notification of Acceptance: October 22, 2013
Pre-proceedings version deadline: November 5, 2013
Proceedings version deadline: December 21, 2013

General Chair:
==============
Dingyi Pei Guangzhou University, China

Program Co-Chairs:
===============

Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, China
Shouhuai Xu University of Texas at San Antonio, USA
Moti Yung Google Inc. and Columbia University, USA

Technical Program Committee
===========================

Gouqiang Bai Tsinghua University
Elisa Bertino Purdue University
Zhenfu Cao Shanghai Jiaotong University
Bogdan Carbunar Florida International University
Kefei Chen Shanghai Jiaotong University
Liqun Chen Hewlett-Packard Laboratories
Zhong Chen Peking University
Sherman S. M. Chow Chinese University of Hong Kong
Ed Dawson Research Director
Jintai Ding University of Cincinnati
Cunsheng Ding Hong Kong University of Science and Technology
Xuhua Ding Singapore Management University
Shlomi Dolev Ben-Gurion University of the Negev
Yingfei Dong University of Hawaii
Lei Hu SKLOIS, Chinese Academy of Sciences, China
Miroslaw Kutylowski Wroclaw University of Technology
Xuejia Lai Shanghai Jiaotong University
Jiangtao Li Intel Corporation
Hui Li Xidian University
Zhiqiang Lin University of Texas at Dallas
Donggang Liu University of Texas at Arlington
Peng Liu The Pennsylvania State University
Di Ma University of Michigan-Dearborn
Subhamoy Maitra Indian Statistical Institute
Florian Mendel Graz University of Technology, Austria
Atsuko Miyaji Japan Advanced Institute of Science and Technology
Yi Mu University of Wollongong, Australia
Claudio Orlandi Aarhus University
Xinming Ou Kansas State University
Ludovic Perret UPMC/LIP6 INRIA/SALSA
Giuseppe Persiano Universita' di Salerno
Bertram Poettering Royal Holloway, University of London
Kouichi Sakurai Kyushu University
Nitesh Saxena University of Alabama at Birmingham
Jae Hong Seo Myongji University, Youngin, Republic of Korea
Claudio Soriente ETH Zürich
Wen-Guey Tzeng National Chiao Tung University
Yevgeniy Vahlis AT&T Labs
Xiaofeng Wang Indiana University, USA
Wenling Wu Institute of Software, CAS, China
Huaxiong Wang Nanyang Technological University
Guilin Wang University of Wollongong
Duncan Wong City University of Hong Kong
Maozhi Xu Peking University
Danfeng Yao Virginia Tech
Chung-Huang Yang National Kaohsiung Normal University
Yunlei Zhao Fudan University
Fangguo Zhang Sun Yat-sen University
Rui Zhang Chinese Academy of Sciences, P.R.C.
Hong-Sheng Zhou University of Maryland
Yuliang Zheng UNC Charlotte
Cliff Zou University of Central Florida

Related Resources

ISNS 2025   The 5th Int'l Conference on Information Security and Network Security
CCIS 2025   2025 Int'l Conference on Cloud Computing and Information Science
ISEEIE 2025   2025 5th International Symposium on https://www.iseeie.org/, Electronics and Information Engineering (ISEEIE 2025)
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
ICISS--EI 2025   2025 The 8th International Conference on Information Science and Systems (ICISS 2025)