posted by user: clegal || 6610 views || tracked by 6 users: [display]

SCN 2020 : 12th Conference on Security and Cryptography for Networks

FacebookTwitterLinkedInGoogle


Conference Series : Security and Cryptography for Networks
 
Link: https://scn.unisa.it
 
When Sep 14, 2020 - Sep 16, 2020
Where Amalfi (SA) - Italy
Submission Deadline May 5, 2020
Notification Due Jun 14, 2020
Final Version Due Jun 28, 2020
Categories    cryptography   security
 

Call For Papers

Apologies if you receive multiple copies.

=====================================================================
SCN 2020

Twelfth Conference on Security and Cryptography for Networks

Call For Papers

September 14-16, 2020, Amalfi (SA), Italy

https://scn.unisa.it/
=====================================================================
NEW
=====================================================================
- NEW SUBMISSION DATE: *May 5th, 2020*

- NEW CONFERENCE DATES: *September 14-16, 2020*.
SCN is re-scheduled right after IEEE Euro S&P in Genova!

- COVID-19: We will keep monitoring the COVID-19 diffusion, following
all the directives that will come from the National or sovra-national
institutions, in the hope it will be over by September. In the
unfortunate case in which some attendees will not be able to
participate for reasons related to COVID-19, we will implement
measures like flexible cancellation policies ands, for authors,
alternative methods for presentations such as pre-recorded videos or
live streaming.

- Proceedings & Special Issue: Springer has formally approved our
request. Also this year SCN proceedings will be published by Springer.
A special issue of Journal of Computer Security will be devoted to
selected papers from SCN 2020.


SCOPE
========================================
The Twelfth Conference on Security and Cryptography for Networks (SCN 2020) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.


TOPICS
========================================
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
Anonymity and Privacy
Applied Cryptography and Implementations
Authentication, Identification and Access Control
Block and Stream Ciphers
Complexity-Theoretic Cryptography
Cloud Computing Security
Cryptanalysis
Cryptocurrencies
Cryptographic Hash Functions
Cryptographic and Security Protocols
Digital Signatures and Message Authentication Codes
Distributed Systems Security
Formal Security Methods
Information-Theoretic Security
Network, Web and Wireless Security
Public-Key Encryption
Physical Cryptography
Security Architectures and Models
Software and Systems Security


SUMISSIONS
========================================
Authors are invited to submit electronically (PDF format) a non-anonymous extended abstract. The extended abstract should be typeset using 11-point or larger fonts, in a single-column, single-space (between lines) format and have reasonable margins. Submissions deviating significantly from these guidelines risk rejection without consideration of their merits. All submissions will be treated as confidential, and will only be disclosed to the committee and their chosen sub-referees. The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. The length of the submission should be at most 14 pages excluding the title page, bibliography, and appendices. Within these 14 pages the submission should clearly indicate the results achieved, their significance, and their relation to other work in the area. Referees are not required to read appendices; the paper should be intelligible without them. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to a journal or to any other conference or workshop with proceedings.

Papers can be submitted via EasyChair at the following address:
https://easychair.org/conferences/?conf=scn2020

PROCEEDINGS AND SPECIAL ISSUE
========================================
The proceedings will be published by Springer in the
Lecture Notes in Computer Science series.

A selection of accepted papers will be invited for a special issue of Journal of Computer Security.

DATES AND DEADLINES
========================================
Submission: May 05, 2020, 23:59 GMT
Notification to authors: June 14, 2020
Camera-Ready Version: June 28, 2020
Conference: September 9-11, 2020

BEST PAPER AWARD
========================================
All submissions are eligible for the Best Paper award. The committee may
decide to split the award between multiple papers, or to decline to make
an award.


PRESENTATION
========================================
Authors of accepted papers must guarantee that their paper will
be presented at the conference.

In the unfortunate case in which some attendees will not be able to
participate for reasons related to COVID-19, we will implement
measures like flexible cancellation policies and alternative methods for
presentations such as pre-recorded videos or live streaming.

ORGANIZERS
========================================
- Program Chair
Vladimir Kolesnikov, Georgia Tech, USA

- Program Committee
Divesh Aggarwal, National University of Singapore
Elena Andreeva, Katholieke Universiteit Leuven
Gilad Asharov, Bar-Ilan University
Saikrishna Badrinarayanan, Visa Research
Manuel Barbosa, University of Porto
Jeremiah Blocki, Purdue University
David Cash, University of Chicago
Dario Catalano, University of Catania
Nishanth Chandran, Microsoft
Sebastian Faust, Technische Universität Darmstadt
Juan A. Garay, Texas A&M University
Romain Gay, Cornell Tech, USA
Stanislaw Jarecki, University of California Irvine
Benoit Libert, CNRS and ENS de Lyon, France
Vadim Lyubashevsky, IBM Zurich
Daniel Masny, VISA Research
Payman Mohassel, Calibra Inc.
Svetla Nikova, Katholieke Universiteit Leuven
Ryo Nishimaki, NTT
Emmanuela Orsini, Katholieke Universiteit Leuven
Giuseppe Persiano, University of Salerno
Mike Rosulek, Oregon State University
Elaine Shi, Cornell University
Francois-Xavier Standaert, Université Catholique de Louvain
Marc Stevens, CWI
Daniele Venturi, Sapienza University of Rome
Damien Vergnaud, Sorbonne Université and IUF
Ivan Visconti, University of Salerno
Xiao Wang, Northwestern University
Daniel Wichs, Northeastern University
Vassilis Zikas, University of Edinburgh

- General Chair
Clemente Galdi, University of Salerno

- Local Organization
Luigi Catuogno, University of Salerno, Italy
Giuseppe Fenza, University of Salerno, Italy
Graziano Fuccio, University of Salerno, Italy
Francesco Orciuoli, University of Salerno, Italy
Rocco Zaccagnino, University of Salerno, Italy

- Steering Committee
Carlo Blundo, Università di Salerno, Italy
Alfredo De Santis, Università di Salerno, Italy
Ueli Maurer, ETH Zurich, Switzerland
Rafail Ostrovsky, University of California - Los Angeles, USA
Giuseppe Persiano, Università di Salerno, Italy
Jacques Stern, ENS Paris, France
Douglas Stinson, University of Waterloo, Canada
Gene Tsudik, University of California - Irvine, USA
Moti Yung, Google, USA
=====================================================================

Related Resources

EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ISCSIC 2025   2025 9th International Symposium on Computer Science and Intelligent Control(ISCSIC 2025)
IJCNN 2025   International Joint Conference on Neural Networks
SECRYPT 2025   22nd International Conference on Security and Cryptography
IJCIS 2024   International Journal on Cryptography and Information Security
IJCSITY 2024   International Journal of Computational Science and Information Technology
21st AIAI 2025   21st (AIAI) Artificial Intelligence Applications and Innovations