| |||||||||||||
ACNS 2018 : Applied Cryptography and Network SecurityConference Series : Applied Cryptography and Network Security | |||||||||||||
Link: https://www.cosic.esat.kuleuven.be/events/acns2018/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. The conference will be organised by the Computer Security and Industrial Cryptography (COSIC) group at KU Leuven. The proceedings of ACNS 2018 will be published by Springer.
ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers. The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include but are not limited to: Access control Applied cryptography Automated security analysis Biometric security/privacy Block chain and cryptocurrencies Cloud security/privacy Complex systems security Critical infrastructure Cryptographic primitives Cryptographic protocols Data protection Database/system security Digital rights management Email, app and web security Future Internet security Human factors in security Identity management IP protection Internet fraud, cybercrime Internet-of-Things security Intrusion detection Key management Malware Mobile/wireless/5G security Network security protocols Privacy/anonymity, PETs Security in e-commerce Security in grid systems Security in P2P systems Security/privacy metrics Trust management Ubiquitous security/privacy Usability in security/privacy Instructions for authors: Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references. Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see http://www.springeronline.com/lncs) with a page limit of 18 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility will be clarified with authors of accepted papers following the notification). Papers should be submitted electronically in PDF format through EasyChair via https://easychair.org/conferences/?conf=acns2018. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. It is strongly encouraged that submissions be processed in LaTeX. Conference organization General chair: Bart Preneel (KU Leuven, Belgium) Program co-chairs: Bart Preneel (KU Leuven, Belgium) Frederik Vercauteren (KU Leuven, Belgium) Program committee: Michel Abdalla (ENS and CNRS, France) Masayuki Abe (NTT, Japan) Elli Androulaki (IBM Research, Switzerland) Alex Biryukov (University of Luxembourg, Luxembourg) Marina Blanton (University at Buffalo, The State University of New York, USA) Jan Camenisch (IBM Research, Switzerland) Liqun Chen (University of Surrey, UK) Chen-Mou Cheng (National Taiwan University, Taiwan) Naccache David (ENS, France) Dieter Gollmann (Hamburg University of Technology, Germany) Peter Gutmann (University of Auckland, New Zealand) Shai Halevi (IBM Research, USA) Goichiro Hanaoka (AIST, Japan) Amir Herzberg (University of Connecticut, USA) Tibor Jager (Paderborn University, Germany) Marc Joye (NXP Semiconductors, USA) Aniket Kate (Purdue University, USA) Stefan Katzenbeisser (TU Darmstadt, Germany) Florian Kerschbaum (University of Waterloo, Canada) Aggelos Kiayias (University of Edinburgh, UK) Kwangjo Kim (KAIST, Korea) Kaoru Kurosawa (Ibaraki University, Japan) Ralf Kusters (University of Stuttgart, Germany) Xuejia Lai (Shanghai Jiaotong University, China) Benoit Libert (CNRS and ENS de Lyon, France) Dongdai Lin (SKLOIS, Chinese Academy of Sciences, China) Michael Locasto (SRI International, USA) Javier Lopez (University of Malaga, Spain) Mark Manulis (University of Surrey, UK) Atefeh Mashatan (Ryerson University, Canada) Bart Mennink (Radboud University, The Netherlands) Atsuko Miyaji (JAIST, Japan) Refik Molva (Eurecom, France) Michael Naehrig (Microsoft Research, USA) Miyako Ohkubo (NICT, Japan) Panos Papadimitratos (KTH Royal Institute of Technology, Sweden) Thomas Peyrin (Nanyang Technological University, Singapore) Josef Pieprzyk (QUT, Australia) Benny Pinkas (Bar Ilan University, Israel) Bart Preneel (KU Leuven, Belgium) Christian Rechberger (TU Graz, Austria) Matt Robshaw (Impinj, USA) Ahmad Sadeghi (TU Darmstadt, Germany) Yu Sasaki (NTT Secure Platform Laboratories, Japan) Willy Susilo (University of Wollongong, Australia) Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan) Damien Vergnaud (ENS, France) Ivan Visconti (University of Salerno, Italy) Frederik Vercauteren (KU Leuven, Belgium) Avishai Wool (Tel Aviv University, Israel) Moti Yung (Snapchat and Colombia University, USA) Jianying Zhou (Singapore University of Technology and Design, Singapore) |
|