ACNS: Applied Cryptography and Network Security



Past:   Proceedings on DBLP

Future:  Post a CFP for 2019 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
ACNS 2018 Applied Cryptography and Network Security
Jul 2, 2018 - Jul 4, 2018 Leuven, Belgium Jan 26, 2018
ACNS 2017 The 15th International Conference on Applied Cryptography and Network Security
Jul 10, 2017 - Jul 12, 2017 Kanazawa, Japan Feb 3, 2017
ACNS 2016 14th International Conference on Applied Cryptography and Network Security
Jun 19, 2016 - Jun 22, 2016 London (Guildford), United Kingdom Feb 10, 2016
ACNS 2015 Applied Cryptography and Network Security
Jun 2, 2015 - Jun 5, 2015 New York, United State Jan 16, 2015
ACNS 2014 12th International Conference on Applied Cryptography and Network Security
Jun 10, 2014 - Jun 13, 2014 Lausanne, Switzerland Jan 20, 2014
ACNS 2013 Applied Cryptography and Network Security
Jun 25, 2013 - Jun 28, 2013 Banff, Alberta, Canada Feb 8, 2013
ACNS 2012 10th International Conference on Applied Cryptography and Network Security
Jun 26, 2012 - Jun 29, 2012 Singapore Feb 12, 2012
ACNS 2010 8th International Conference on Applied Cryptography and Network Security
Jun 22, 2010 - Jun 25, 2010 Beijing, China Feb 5, 2010
ACNS 2008 Applied Cryptography and Network Security
Jun 3, 2008 - Jun 6, 2008 New York, NY, USA Jan 14, 2008

Present CFP : 2018

The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. The conference will be organised by the Computer Security and Industrial Cryptography (COSIC) group at KU Leuven. The proceedings of ACNS 2018 will be published by Springer.

ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.

The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include but are not limited to:

Access control
Applied cryptography
Automated security analysis
Biometric security/privacy
Block chain and cryptocurrencies
Cloud security/privacy
Complex systems security
Critical infrastructure
Cryptographic primitives
Cryptographic protocols
Data protection
Database/system security
Digital rights management
Email, app and web security
Future Internet security
Human factors in security
Identity management
IP protection
Internet fraud, cybercrime
Internet-of-Things security
Intrusion detection
Key management
Mobile/wireless/5G security
Network security protocols
Privacy/anonymity, PETs
Security in e-commerce
Security in grid systems
Security in P2P systems
Security/privacy metrics
Trust management
Ubiquitous security/privacy
Usability in security/privacy

Instructions for authors: Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references. Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see with a page limit of 18 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility will be clarified with authors of accepted papers following the notification). Papers should be submitted electronically in PDF format through EasyChair via Submissions not meeting the submission guidelines risk rejection without consideration of their merits. It is strongly encouraged that submissions be processed in LaTeX.

Conference organization

General chair:
Bart Preneel (KU Leuven, Belgium)
Program co-chairs:
Bart Preneel (KU Leuven, Belgium)
Frederik Vercauteren (KU Leuven, Belgium)
Program committee:
Michel Abdalla (ENS and CNRS, France)
Masayuki Abe (NTT, Japan)
Elli Androulaki (IBM Research, Switzerland)
Alex Biryukov (University of Luxembourg, Luxembourg)
Marina Blanton (University at Buffalo, The State University of New York, USA)
Jan Camenisch (IBM Research, Switzerland)
Liqun Chen (University of Surrey, UK)
Chen-Mou Cheng (National Taiwan University, Taiwan)
Naccache David (ENS, France)
Dieter Gollmann (Hamburg University of Technology, Germany)
Peter Gutmann (University of Auckland, New Zealand)
Shai Halevi (IBM Research, USA)
Goichiro Hanaoka (AIST, Japan)
Amir Herzberg (University of Connecticut, USA)
Tibor Jager (Paderborn University, Germany)
Marc Joye (NXP Semiconductors, USA)
Aniket Kate (Purdue University, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Florian Kerschbaum (University of Waterloo, Canada)
Aggelos Kiayias (University of Edinburgh, UK)
Kwangjo Kim (KAIST, Korea)
Kaoru Kurosawa (Ibaraki University, Japan)
Ralf Kusters (University of Stuttgart, Germany)
Xuejia Lai (Shanghai Jiaotong University, China)
Benoit Libert (CNRS and ENS de Lyon, France)
Dongdai Lin (SKLOIS, Chinese Academy of Sciences, China)
Michael Locasto (SRI International, USA)
Javier Lopez (University of Malaga, Spain)
Mark Manulis (University of Surrey, UK)
Atefeh Mashatan (Ryerson University, Canada)
Bart Mennink (Radboud University, The Netherlands)
Atsuko Miyaji (JAIST, Japan)
Refik Molva (Eurecom, France)
Michael Naehrig (Microsoft Research, USA)
Miyako Ohkubo (NICT, Japan)
Panos Papadimitratos (KTH Royal Institute of Technology, Sweden)
Thomas Peyrin (Nanyang Technological University, Singapore)
Josef Pieprzyk (QUT, Australia)
Benny Pinkas (Bar Ilan University, Israel)
Bart Preneel (KU Leuven, Belgium)
Christian Rechberger (TU Graz, Austria)
Matt Robshaw (Impinj, USA)
Ahmad Sadeghi (TU Darmstadt, Germany)
Yu Sasaki (NTT Secure Platform Laboratories, Japan)
Willy Susilo (University of Wollongong, Australia)
Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan)
Damien Vergnaud (ENS, France)
Ivan Visconti (University of Salerno, Italy)
Frederik Vercauteren (KU Leuven, Belgium)
Avishai Wool (Tel Aviv University, Israel)
Moti Yung (Snapchat and Colombia University, USA)
Jianying Zhou (Singapore University of Technology and Design, Singapore)

Related Resources

CRC-Botnets 2018   Botnets: Architectures, Countermeasures, and Challenges
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
SCSN 2019   International Workshop on Semantic Computing for Social Networks and Organization Sciences: from user information to social knowledge
NMOCT 2018   4th International Conference On Networks, Mobile Communications And Telematics
FC 2019   Financial Cryptography
IJRAP 2018   International Journal of Recent advances in Physics
SVSS 2018   International Workshop on the Security of Video Surveillance Systems
AVC 2018   Advances in Vision Computing: An International Journal
ICCSP--Ei Compendex and Scopus 2019   2019 the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019)--Ei Compendex and Scopus
SECITC 2018   11th International Conference on Security for Information Technology and Communications