CANS: Cryptology and Network Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2025 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
CANS 2024 The International Conference on Cryptology and Network Security (CANS)
Sep 24, 2024 - Sep 27, 2024 Cambridge, UK Apr 24, 2024
CANS 2023 Cryptology and Network Security
Oct 31, 2023 - Nov 2, 2023 Augusta, Georgia, USA Jul 13, 2023
cans 2022 21st International Conference on Cryptology and Network Security Abu Dhabi, UAE
Nov 13, 2022 - Nov 16, 2022 The St. Regis - Corniche Rd - Abu Dhabi TBD
CANS 2021 Cryptology and Network Security
Dec 13, 2021 - Dec 15, 2021 Vienna, Austria Jun 17, 2021
CANS 2020 Cryptology and Network Security
Dec 14, 2020 - Dec 16, 2020 Vienna, Austria Jul 5, 2020
CANS 2019 Cryptology and Network Security
Oct 25, 2019 - Oct 27, 2019 Fuzhou, China May 6, 2019
CANS 2018 17th International Conference on Cryptology and Network Security
Sep 30, 2018 - Oct 3, 2018 Naples, Italy May 17, 2018
CANS 2016 15th International Conference on Cryptology and Network Security
Nov 14, 2016 - Nov 16, 2016 Milan, Italy Jul 20, 2016
CANS 2014 13rd International Conference on Cryptology and Network Security
Oct 22, 2014 - Oct 24, 2014 Heraklion Crete, Greece Jun 20, 2014 (Jun 17, 2014)
CANS 2013 International Conference on Cryptology and Network Security
Nov 20, 2013 - Nov 22, 2013 Paraty, Brazil Jun 11, 2013
CANS 2012 11th International Conference on Cryptology and Network Security
Dec 12, 2012 - Dec 14, 2012 Darmstadt, Germany Jul 15, 2012
CANS 2010 The Ninth International Conference on Cryptology And Network Security (CANS 2010)
Dec 12, 2010 - Dec 14, 2010 Malaysia Jun 18, 2010
CANS 2009 The 8th International Conference on Cryptology and Network Security
Dec 12, 2009 - Dec 14, 2009 Kanazawa, Japan Jun 17, 2009
 
 

Present CFP : 2024

Call for Papers
The International Conference on Cryptology and Network Security (CANS) is a premier forum for presenting research in the field of cryptology and network security. The conference seeks academic, industry, and government submissions on all theoretical and practical cryptology and network security aspects. This year marks the 23rd iteration of the conference and will be held at the University of Cambridge, England. Proceedings of previous iterations of the conference were published by Springer LNCS and we have applied to do the same this year.
Submission guidelines

High quality papers on unpublished research and implementation experiences may be submitted. All papers must be original and not substantially duplicated work that has been published at, or is simultaneously submitted to, a journal or another conference or workshop. All submissions must be written in English and span no more than 20 pages in the Springer’s Lecture Notes in Computer Science (LNCS) format (a Springer template can be found in Overleaf), including title, abstract, and bibliography. The introduction should summarize the contributions of the paper at a level understandable by a non-expert reader and explain the context to related work.

Submitted papers may contain supplementary material in the form of well-marked appendices. Note that supplementary material will not be included in the proceedings. Moreover, the main paper should be intelligible without requiring the reader to consult the supplementary material.

Submissions must be anonymous (no author names, affiliations, acknowledgments, or obvious references). The conference will also consider short papers of up to eight pages in the LNCS format, excluding the bibliography (max 2 pages), for results that are not yet fully fleshed out or that simply require few pages to describe but still make a significant contribution.

All submissions must be processed with LaTeX2e according to the instructions given by Springer. Submitted manuscripts must be typeset in plain Springer LNCS format, in particular without changing the font size, margins or line spacing. Submissions not meeting these guidelines may be rejected without consideration of their merits.

Papers must be submitted via EasyChair. The deadline for submissions is 14 April anywhere on earth (AoE).
Presentation requirements

At least one author of every accepted paper must register and pay the full registration fee (non-student) for the conference by the early registration deadline indicated by the organizers. Papers without a registered author will be removed from the sessions. Authors must present their own paper(s). Session proceedings, including all accepted papers, will be published in LNCS and will be available at the conference.
Topic areas:

Access Control

Anonymity and Censorship Resistance

Applied Cryptography

Artificial Intelligence for Security

Attacks & Malicious Code

Biometrics

Block & Stream Ciphers

Blockchain Security and Privacy

Cognitive Cities Security and Privacy

Confidential Computing

Cryptographic Algorithms and Primitives

Cryptographic Protocols

Cyber Physical Security

Data and Application Security

Denial of Service Protection

Data and Computation Integrity

Edge/Fog Computing Security and Privacy

Embedded System Security

Formal Methods for Security and Privacy

Hash Functions

Identity Management and Privacy

IoT Security

Key Management

Location Based Services Security and Privacy

Malware Analysis and Detection

Network Security

On-line Social Networks Security and Privacy

Peer-to-Peer Security and Privacy

Privacy-Enhancing Technologies

Public Key Cryptography

Security and Privacy for Big Data

Security and Privacy in the Cloud

Security and Privacy of ML and AI based Systems

Security and Resilient solutions for Critical Infrastructures (e.g., Smart Grid, TelCo Networks, AirPorts, Ports…)

Security Architectures

Security in Content Delivery

Security Models

Secure Multi-Party Computation

Secure Distributed Computing

Security in Pervasive Systems

Sensor Network Security

Security in Crowdsourcing

Trust Management

Usable Security

Virtual Private Networks

Web Security

Wireless and Mobile Security

Zero-Knowledge Proofs
 

Related Resources

CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
CANS 2024   Cryptology and Network Security
IJCNN 2025   International Joint Conference on Neural Networks