ACNS: Applied Cryptography and Network Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2020 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ACNS 2019 International Conference on Applied Cryptography and Network Security
Jun 5, 2019 - Jun 7, 2019 Bogotá, Colombia Jan 22, 2019
ACNS 2018 Applied Cryptography and Network Security
Jul 2, 2018 - Jul 4, 2018 Leuven, Belgium Jan 26, 2018
ACNS 2017 The 15th International Conference on Applied Cryptography and Network Security
Jul 10, 2017 - Jul 12, 2017 Kanazawa, Japan Feb 3, 2017
ACNS 2016 14th International Conference on Applied Cryptography and Network Security
Jun 19, 2016 - Jun 22, 2016 London (Guildford), United Kingdom Feb 10, 2016
ACNS 2015 Applied Cryptography and Network Security
Jun 2, 2015 - Jun 5, 2015 New York, United State Jan 16, 2015
ACNS 2014 12th International Conference on Applied Cryptography and Network Security
Jun 10, 2014 - Jun 13, 2014 Lausanne, Switzerland Jan 20, 2014
ACNS 2013 Applied Cryptography and Network Security
Jun 25, 2013 - Jun 28, 2013 Banff, Alberta, Canada Feb 8, 2013
ACNS 2012 10th International Conference on Applied Cryptography and Network Security
Jun 26, 2012 - Jun 29, 2012 Singapore Feb 12, 2012
ACNS 2010 8th International Conference on Applied Cryptography and Network Security
Jun 22, 2010 - Jun 25, 2010 Beijing, China Feb 5, 2010
ACNS 2008 Applied Cryptography and Network Security
Jun 3, 2008 - Jun 6, 2008 New York, NY, USA Jan 14, 2008
 
 

Present CFP : 2019

The 17th International Conference on Applied Cryptography and Network Security (ACNS 2019) will be held in Bogotá, Colombia from June 5 to June 7, 2019. The conference will be organised by the Department of Applied Mathematics and Computer Science of the Universidad del Rosario. The proceedings of ACNS 2019 will be published by Springer. This year, a 1000 EUR prize for the Best Student Paper award will be sponsored by Springer.

ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.

The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include but are not limited to:

Access control

Applied cryptography

Automated security analysis

Biometric security/privacy

Block chain and cryptocurrencies

Cloud security/privacy

Complex systems security

Critical infrastructure

Cryptographic primitives

Cryptographic protocols

Data protection

Database/system security

Digital rights management

Email, app and web security

Future Internet security

Human factors in security

Identity management

IP protection

Internet fraud, cybercrime

Internet-of-Things security

Intrusion detection

Key management

Malware

Mobile/wireless/5G security

Network security protocols

Privacy/anonymity, PETs

Security in e-commerce

Security in grid systems

Security in P2P systems

Security/privacy metrics

Trust management

Ubiquitous security/privacy

Usability in security/privacy

*************************

Submission: 22 January 2019 23:59 AOE (Anywhere on Earth)

Notification: 22 March 2019

Final Version: 5 April 2019

*************************

Instructions for authors: Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references. Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see http://www.springeronline.com/lncs) with a page limit of 18 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility will be clarified with authors of accepted papers following the notification). Papers should be submitted electronically in PDF format through EasyChair (link will be provided soon). Submissions not meeting the submission guidelines risk rejection without consideration of their merits. It is strongly encouraged that submissions be processed in LaTeX.

*************************

Conference organization

General co-chairs:

Valérie Gauthier (Universidad del Rosario, Colombia)
Martín Ochoa (Universidad del Rosario, Colombia)

Program co-chairs:

Robert Deng (Singapore Management University, Singapore)
Moti Yung (Columbia University, USA)

Program Committee:

Michel Abdalla (ENS & CNRS, France)
Gail-Joon Ahn (Arizona State University, USA)
Man Ho Au (The Hong Kong Polytechnic University, Hong Kong)
Joonsang Baek (University of Wollongong, Australia)
Alex Biryukov (University of Luxembourg, Luxembourg)
Pino Caballero-Gil (University of La Laguna, Spain)
Alvaro Cardenas (University of Texas at Dallas, USA)
Xiaofeng Chen (Xidian University, China)
Liqun Chen (University of Surrey, UK)
Sherman S. M. Chow (The Chinese University of Hong Kong, Hong Kong)
Mauro Conti (University of Padua, Italy)
Jorge Cuellar (Siemens AG, Germany)
Robert Deng (Singapore Management University, Singapore)
Xuhua Ding (Singapore Management University, Singapore)
Benjamin Dowling (Royal Holloway University of London,UK)
Sara Foresti (Università degli Studi di Milano, Italy)
Debin Gao (Singapore Management University, Singapore)
Joaquin Garcia-Alfaro (Telecom SudParis, France)
Maria Isabel Gonzalez Vasco (Universidad Rey Juan Carlos, Spain)
Alejandro Hevia (University of Chile, Chile)
Shoichi Hirose (University of Fukui, Japan)
Xinyi Huang (Fujian Normal University, China)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Hiroaki Kikuchi (Meiji University, Japan)
Mirosław Kutyłowski (Wrocław University of Science and Technology, Poland)
Junzuo Lai (Jinan University, China)
Yingjiu Li (Singapore Management University, Singapore)
Shujun Li (University of Kent, UK)
Joseph Liu (Monash University, Australia)
Javier Lopez (University of Malaga, Spain)
Di Ma (University of Michigan, USA)
Mark Manulis (University of Surrey, UK)
Takahiro Matsuda (National Institute of Advanced Industrial Science and Technology, Japan)
Sjouke Mauw (University of Luxembourg, Luxembourg)
Martín Ochoa (Universidad del Rosario, Colombia)
Panos Papadimitratos (KTH Royal Institute of Technology, Sweden)
Thomas Peters (Université catholique de Louvain, Belgium)
Bertram Poettering (Royal Holloway, University of London, UK)
Christina Pöpper (New York University Abu Dhabi, UAE)
Zhan Qin (State University of New York at Buffalo, USA)
Ruben Rios (University of Malaga, Spain)
Francisco Rodríguez Henríquez (CINVESTAV-IPN, Mexico)
Sushmita Ruj (Indian Statistical Institute, India)
Giovanni Russello (The University of Auckland, New Zealand)
Chunhua Su (University of Aizu, Japan)
Hung-Min Sun (National Tsing Hua University, Taiwan)
Qiang Tang (Cornell University, USA)
Juan Tapiador (Universidad Carlos III de Madrid, Spain)
Nils Ole Tippenhauer (CISPA, Germany)
Cong Wang (City University of Hong Kong, Hong Kong)
Jian Weng (Jinan University, China)
Hongjun Wu (Nanyang Technological University, Singapore)
Qianhong Wu (Beihang University, China)
Toshihiro Yamauchi (Okayama University, Japan)
Guomin Yang (University of Wollongong, Australia)
Tsz Hon Yuen (The University of Hong Kong, Hong Kong)
Moti Yung (Google and Columbia University, USA)
Santiago Zanella-Béguelin (Microsoft Research, UK)
Kehuan Zhang (The Chinese University of Hong Kong, Hong Kong)
Jianying Zhou (Singapore University of Technology and Design, Singapore)
 

Related Resources

ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ITCE 2019   The International Conference on Innovative Trends in Computer Engineering
NECO 2018   7th International Conference of Networks and Communications
DSN 2019   Dependable Systems and Networks
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)
CRC-Botnets 2018   Botnets: Architectures, Countermeasures, and Challenges
IEEE S&P 2019   IEEE Symposium on Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
ICINT--EI, Scopus 2019   2019 4th International Conference on Information and Network Technologies (ICINT 2019)--EI Compendex, Scopus