posted by organizer: C2SI || 8661 views || tracked by 7 users: [display]

C2SI 2019 : 3rd International Conference on Codes, Cryptology and Information Security

FacebookTwitterLinkedInGoogle

Link: http://www.c2si-conference.org
 
When Apr 22, 2019 - Apr 24, 2019
Where Mohammed V University in Rabat
Submission Deadline Nov 30, 2018
Notification Due Jan 20, 2019
Final Version Due Feb 15, 2019
Categories    coding theory   cryptology   security   information
 

Call For Papers

CALL FOR PAPERS
===============

The third International Conference on Codes, Cryptology and Information Security (C2SI-2019) aims to bring together researchers in the fields of coding theory, cryptology and information Security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas.
The focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences in the following fields from academia, government, and industry presenting novel research.


TOPICS OF INTEREST
==================

Areas of interest include, but are not limited to:
Access Control Models
Applied Cryptography
Attacks & Malicious Code
Authentication, Identification
Block & Stream Ciphers
Blockchain Security and Privacy
Boolean Functions
Code-based Cryptography
Coding theory
Cryptanalysis
Cryptographic Algorithms and Primitives
Cryptographic Protocols
Data Protection
Denial of Service Protection
Elliptic-curve cryptography
Embedded System Security
Error correcting codes
Fingerprinting
Formal Methods for Security
Hash Functions
Identity and Security in IoT
Identity-based encryption (IBE)
Information Hiding
Information theory
Intrusion Detection & Prevention
Language-Based Security
Lattice-Based Cryptography
Malware Analysis and Detection
Mobile Agents Security
Mobile Security
Multivariate cryptography
Network Security
Post-Quantum cryptography
Public Key Cryptography
Quantum Cryptology
Random and pseudorandom generators
RFID security
Secure Distributed Computing
Security and Privacy for Big Data
Security and Privacy in the Cloud
Security Architectures
Security in Grid Computing
Security in Social Networks
Security in the Internet of Things
Security Models
Security Policies
Sensor Network Security
Side channel attacks
Signature, Integrity
Smart cards Security
Steganography
Watermarking
Wireless and Mobile Security


PAPER SUBMISSION
================

Submission to C2SI-2019 must be original and not substantially duplicate work that has been published or is simultaneously submitted to a journal or another conference/workshop with proceedings. Papers that contain any form of plagiarism or self-plagiarism will be rejected without reviews. All submissions will be blind-refereed.
All papers must be written in English, complete, intelligible and self-contained within at most 20 pages in Springer's Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. Information about the Springer LNCS format can be found at http://www.springer.de/comp/lncs/authors.html . Supplementary materials that facilitate verification of the results, e.g. source code, proof details, etc., may be appended without a page limit or uploaded as separate files, but reviewers are neither required to read them nor will they be printed in the proceedings. Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references. All submissions must be processed with LaTeX and follow Springer's LNCS format without changing default margins, fonts, fonts size, line spacing etc. Submissions not meeting these guidelines may be rejected without consideration of their merits. Papers must be submitted electronically in PDF format via easychair https://easychair.org/conferences/
At least one author of each accepted paper is required to register with the conference and present the paper. Papers which are not registred will not be included in the Proceeding. All accepted and registred papers will be published in the series LNCS like in C2SI-2015 and C2SI-2017. Proceedings will be available at the conference. Note that any submission to C2SI 2019 implies the full acknowledgment and commitment of the authors to the entire review process.


IMPORTANT DATES
===============

Submission deadline: November 30, 2018, 23:59 GMT
Notification to authors: January 20, 2019
Camera-Ready and Registration: February 15, 2019, 23:59 GMT
Conference: April 22 - 24 , 2019
Social event: April 24 - 27, 2019

Related Resources

SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ICITS 2025   2025 The 13th International Conference on Information Technology and Science (ICITS 2025)
JCICE 2025   2025 4th International Joint Conference on Information and Communication Engineering (JCICE 2024)
SPML--EI 2025   2025 8th International Conference on Signal Processing and Machine Learning (SPML 2025)
CTCM 2024   10th International Conference of Control Theory and Computer Modelling
DIS 2025   The 8th International Conference on the Dynamics of Information Systems