posted by user: KevinChen || 4729 views || tracked by 6 users: [display]

Inscrypt 2015 : 11th International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : Information Security and Cryptology
 
Link: http://inscrypt.cn/
 
When Nov 1, 2015 - Nov 3, 2015
Where Beijing
Submission Deadline Aug 10, 2015
Notification Due Oct 8, 2015
Final Version Due Oct 15, 2015
 

Call For Papers

CALL FOR PAPERS
11th International Conference on Information Security and Cryptology
Inscrypt 2015
November 1 - 3, 2015, Beijing, China
http://www.inscrypt.cn/

--- In Cooperation with IACR ---

The 11th China International Conference on Information Security and Cryptology
(Inscrypt 2015) will be held in Beijing, from November 1 to 3, 2015, co-organized
by the State Key Laboratory of Information Security, the Chinese Association for
Cryptologic Research of China, and In Cooperation with IACR. It is an annual
conference targeting the top research results in the related area. Topics of
interest encompass research advances in ALL areas of information security,
cryptology, and their applications. Inscrypt 2015 seeks high-quality research
contributions in the form of well-developed papers, and two successive tracks for
crypto and security respectively will be organized. The conference proceedings
will be published by Springer-Verlag in LNCS series.

Papers
======
Authors are invited to submit full papers presenting new research results related
to cryptology, information security and their applications for either crypto track
or security track. All submissions must describe original research that is not published
or currently under review by another conference or journal. Areas of interest include,
but are not limited to:


Crypto Track:
-------------
Foundations of Cryptography
Provable Security
Sequences and Boolean Functions
Secure Multiparty Computation
Symmetric Key Cryptosystems
Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Key Management and Key Recovery
Security Protocols and Their Analysis
Information Hiding and Watermarking
Secure Computation Outsourcing
Functional Computation and Verifiable Computation
Obfuscation
Leakage Resilient Cryptography

Security Track:
---------------
Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Electronic Commerce Security
Intrusion Detection
Network Security
Security Modeling and Architectures
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
Privacy Enhancing Technologies
Genomic Privacy and SDN Security
Big Data and Cloud Security


Instruction for Authors
=======================
Conference language is English. All submissions must be anonymous, with no author
names, affiliations, acknowledgments, or obvious references. It should begin with
a title, a short abstract, and a list of key words, and its introduction should
summarize the contributions of the paper at a level appropriate for a non-specialist
reader. The paper should be intelligible and self-contained within 20 pages including
references and appendices and must be submitted electronically to
http://www.easychair.org/conferences/?conf=inscrypt2015 .
Submissions not meeting these guidelines risk rejection without consideration of their
merits. It is highly advised to prepare the submissions in the Springer LNCS format.
More information can be found at conference web site http://www.inscrypt.cn/.

Important Dates
===============
Deadline for Submission: August 10, 2015
Notification of Acceptance: October 8, 2015
Pre-proceedings version deadline: October 15, 2015
Proceedings version deadline: December 3, 2015


Conference Chair:
=================
Dan Meng, Institute of Information Engineering, CAS, China
Jianying Zhou, Institute for Infocomm Research, Singapore

Program Co-Chairs:
==================
Dongdai Lin, Institute of Information Engineering, CAS, China
Xiaofeng Wang, Indiana University at Bloomington, USA
Moti Yung, Google Inc. & Columbia University, USA

Local Orgranizing committee Co-Chairs:
=====================================
Chuankun Wu, Institute of Information Engineering, CAS, China
Yanping Yu, Chinese Association for Cryptologic Research, China

Publicity Chair
===============
Kai Chen, SKLOIS, Institute of Information Engineering, CAS, China

Technical Program Committee
===========================
Erman Ayday Bilkent University, Turkey
Elisa Bertino Purdue University, USA
Ioana Boureanu Akamai Technologies Limited, UK
Kai Chen Institute of Information Engineering, CAS, China
Kefei Chen Hangzhou Normal University, China
Liqun Chen Hewlett-Packard Laboratories, UK
Xiaofeng Chen Xidian University, China
Sherman S. M. Chow Chinese University of Hong Kong, China
Nicolas Courtois University College London, UK
Laszlo Csirmaz Central European University, Hungary
Jintai Ding University of Cincinnati, USA
Cunsheng Ding Hong Kong University of Science and Technology, China
Yingfei Dong University of Hawaii, USA
Chun-I Fan National Sun Yat-sen University, Taiwan
Debin Gao Singapore Management University, Singapore
Dawu Gu Shanghai Jiao Tong University, China
Huaqun Guo Institute for Infocomm Research, Singapore
Jian Guo Nanyang Technological University, Singapore
Weili Han Fudan University, China
Feng Hao Newcastle University, UK
Tor Helleseth University of Bergen, Norway
Matt Henricksen Institute For Infocomm Research, Singapore
Lei Hu Institute of Information Engineering, CAS, China
Xinyi Huang Fujian Normal University, China
Mehmet Sabir Kiraz TUBITAK BILGEM, Turkey
Ninghui Li Purdue University, USA
Yingjiu Li Singapore Management University, Singapore
Tieyan Li Huawei, Singapore
Xin Li John Hopkins University, USA
Peng Liu The Pennsylvania State University, USA
Yang Liu Nanyang Technological University, Singapore
Di Ma University of Michigan-Dearborn, USA
Subhamoy Maitra Indian Statistical Institute, India
Florian Mendel Graz University of Technology, Austria
Atsuko Miyaji Japan Advanced Institute of Science and Technology, Japan
Maria Naya-Plasencia Inria, France
Giuseppe Persiano Universita di Salerno, Italy
Thomas Peters Ecole Normale Superieure, France
Josef Pieprzyk Queensland University of Technology, Australia
Bertram Poettering Ruhr University Bochum, Germany
Zhiyun Qian University of California, Riverside, USA
Longjiang Qu National University of Defense Technology, China
Giovanni Russello The University of Auckland, New Zealand
Seungwon Shin KAIST, Korea
Willy Susilo University of Wollongong, Australia
Shaohua Tang South China University of Technology, China
Vijay Varadharajan Macquarie University, Australia
Cong Wang City University of Hong Kong, China
Meiqin Wang Shandong University, China
Jian Weng Jinan University, China
Wenling Wu Institute of Software, CAS, China
Shouhuai Xu University of Texas at San Antonio, USA
Wenyuan Xu Zhejiang University, China
Danfeng Yao Virginia Tech, USA
Ting Yu Qatar Computing Research Institute, Qatar
Yu Yu Shanghai Jiao Tong University, China
Kehuan Zhang Chinese University of Hong Kong, China
Fangguo Zhang Sun Yat-sen University, China
Yuliang Zheng University of Alabama at Birmingham, USA
Vassilis Zikas ETH Zurich
Cliff Zou University of Central Florida, USA


Conference email
================
Inscrypt@iie.ac.cn

Related Resources

IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
SCID @ AsiaCCS 2025   The 2nd workshop on Security-Centric Strategies for Combating Information Disorder
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
CGIP--EI 2025   2025 3rd International Conference on Computer Graphics and Image Processing (CGIP 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust