posted by user: glivraga || 23713 views || tracked by 50 users: [display]

ACNS 2012 : 10th International Conference on Applied Cryptography and Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Applied Cryptography and Network Security
 
Link: http://icsd.i2r.a-star.edu.sg/acns2012
 
When Jun 26, 2012 - Jun 29, 2012
Where Singapore
Submission Deadline Feb 12, 2012
Notification Due Apr 10, 2012
Final Version Due Apr 24, 2012
Categories    applied cryptography   network security   privacy
 

Call For Papers

***Deadline extended to February 12, 2012***


CALL FOR PAPERS
10th International Conference on Applied Cryptography and Network Security (ACNS 2012)
Singapore -- June 26-29, 2012


The 10th International Conference on Applied Cryptography and Network
Security (ACNS 2012) will be held in Singapore. The conference seeks
submissions from academia, industry, and government presenting novel
research on all aspects of applied cryptography as well as network
security and privacy. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged.
The conference has two tracks: a research track and an industry track.
Topics of interest include, but are not limited to:

- Access control
- Applied cryptography
- Automated protocols analysis
- Biometric security and privacy
- Complex systems security
- Critical infrastructure protection
- Cryptographic primitives and protocols
- Data protection
- Database and system security
- Digital rights management
- Email and web security
- Identity management
- Intellectual property protection
- Internet fraud
- Intrusion detection and prevention
- Key management
- Malware
- Network security protocols
- Privacy, anonymity, and untraceability
- Privacy-enhancing technology
- Protection for the future Internet
- Secure mobile agents and mobile code
- Security in e-commerce
- Security in P2P systems
- Security in pervasive/ubiquitous computing
- Security and privacy in cloud and grid systems
- Security and privacy in distributed systems
- Security and privacy in smart grids
- Security and privacy in wireless networks
- Security and privacy metrics
- Trust management
- Usability and security


SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should
be at most 18 pages for research track and at most 8 pages for
industry track, including the bibliography and well-marked
appendices, and should follow the LNCS style. Submissions are
to be made to the submission web site at
http://www.easychair.org/account/signin.cgi?conf=acns2012.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 12, 2012
(11:59 p.m. American Samoa time). Authors should indicate whether their
submission should be considered for the best student paper award;
any paper co-authored by at least a full time student is eligible.
Authors of accepted papers must guarantee that their papers will
be presented at the conference. Papers accepted for the research
track will be published in proceedings published by Springer's LNCS
and available at the conference. Extended versions of selected best
papers will be invited for a special issue on the Journal of
Computer Security.


IMPORTANT DATES
Paper submission due: February 12, 2012 (11:59 p.m. American Samoa time)
Notification to authors: April 10, 2012
Camera ready due: April 24, 2012


GENERAL CHAIR
Jianying Zhou
I2R, Singapore


PROGRAM CHAIRS
Feng Bao
I2R, Singapore

Pierangela Samarati
Universita` degli Studi di Milano, Italy


ORGANIZING CHAIR
Shen-Tat Goh
I2R, Singapore


PUBLICITY CHAIRS
Xinyi Huang
I2R, Singapore

Giovanni Livraga
Universita` degli Studi di Milano, Italy


PROGRAM COMMITTEE
Michel Abdalla (ENS, France)
Vijay Atluri (Rutgers University, USA)
Lucas Ballard (Google, USA)
Paulo Barreto (University of Sao Paulo, Brazil)
Lujo Bauer (Carnegie Mellon University, USA)
Marina Blanton (University of Notre Dame, USA)
Carlo Blundo (Universita' degli Studi di Salerno, Italy)
Levente Buttyan (Budapest Uni of Technology and Economics, Hungary)
Roy Campbell (University of Illinois at Urbana-Champaign, USA)
Liqun Chen (HP Labs, UK)
Chen-Mou Cheng (National Taiwan University, Taiwan)
Jung Hee Cheon (Seoul National University, Korea)
Sherman Chow (University of Waterloo, Canada)
Sabrina De Capitani di Vimercati (Universita' degli Studi di Milano, Italy)
Robert Deng (Singapore Management University, Singapore)
Roberto Di Pietro (Universita' di Roma Tre, Italy)
Xuhua Ding (Singapore Management University, Singapore)
Kevin Du (Syracuse University, USA)
Wu-Chang Feng (Portland State University, USA)
Sara Foresti (Universita' degli Studi di Milano, Italy)
Keith Frikken (Miami University, USA)
Rosario Gennaro (IBM Research, USA)
Dieter Gollmann (Hamburg University of Technology, Germany)
Stefanos Gritzalis (University of the Aegean, Greece)
Dawu Gu (Shanghai Jiaotong University, China)
Guofei Gu (Texas A&M University, USA)
Sushil Jajodia (George Mason University, USA)
Stanislaw Jarecki (University of California Irvine, USA)
Aaron Johnson (Naval Research Laboratory, USA)
Angelos Keromytis (Columbia University, USA)
Steve Kremer (ENS Cachan, France)
Ralf Kuesters (University of Trier, Germany)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Adam J. Lee (University of Pittsburgh, USA)
Hui Li (Xidian University, China)
Zhenkai Liang (National University of Singapore, Singapore)
Benoit Libert (Universite Catholique de Louvain, Belgium)
Peng Liu (Penn State University, USA)
Michael Locasto (University of Calgary, Canada)
Javier Lopez (University of Malaga, Spain)
Mark Manulis (TU Darmstadt, Germany)
Atsuko Miyaji (JAIST, Japan)
Refik Molva (EURECOM, France)
Yi Mu (University of Wollongong, Australia)
Peng Ning (North Carolina State University, USA)
Elisabeth Oswald (University of Bristol, UK)
Vincent Rijmen (Katholieke Universiteit Leuven, Belgium)
Matt Robshaw (Orange Labs, France)
Radu Sion (Stony Brook University, USA)
Neeraj Suri (TU Darmstadt, Germany)
Willy Susilo (University of Wollongong, Australia)
Tsuyoshi Takagi (Kyushu University, Japan)
Vrizlynn Thing (Institute for Infocomm Research, Singapore)
Jaideep Vaidya (Rutgers University, USA)
Michael Waidner (Fraunhofer, Germany)
Haining Wang (College of William and Mary, USA)
Steve Weis (AppDirect, USA)
Duncan Wong (City University of Hong Kong, China)
Avishai Wool (Tel Aviv University, Israel)
Shouhuai Xu (University of Texas at San Antonio, USA)
Yanjiang Yang (Institute for Infocomm Research, Singapore)
Danfeng Yao (Virginia Tech, USA)
Moti Yung (Google, USA)

This call for papers and additional information about the
conference can be found at http://icsd.i2r.a-star.edu.sg/acns2012

The history and statistics of ACNS can be found at ACNS Home
-- http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 1
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
SECRYPT 2025   22nd International Conference on Security and Cryptography
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)