posted by user: zhou_jianying || 21224 views || tracked by 42 users: [display]

ACNS 2013 : Applied Cryptography and Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Applied Cryptography and Network Security
 
Link: http://acns2013.cpsc.ucalgary.ca/
 
When Jun 25, 2013 - Jun 28, 2013
Where Banff, Alberta, Canada
Submission Deadline Feb 8, 2013
Notification Due Apr 4, 2013
Final Version Due Apr 15, 2013
Categories    cryptography   security
 

Call For Papers

Latest News: Submission Deadline Extended to February 8, 2013 !
Latest News: Student Stipends: Limited student stipends will be available to student presenters!

++++++++++++++++++++++++++++++++++++++++

The 11th International Conference on Applied Cryptography and Network
Security (ACNS 2013) will be held in Banff, Alberta, Canada. The
conference seeks submissions from academia, industry, and government
presenting novel research on all aspects of applied cryptography as
well as network security and privacy. Submissions in emerging areas of
security including cloud security, secure infrastructure for big data
are highly encouraged. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged. The
conference has two tracks: a research track and an industry track.
The industrial track will consist of presentations and tutorial
sessions, without formal proceedings. Submissions for either track
may focus on new visions, industrial challenges, case studies or
experimental reports related to implementation or deployment of
real-world systems or policies. Tutorials can cover current techniques
or best practices in applying cryptography to computer and information
systems. Topics of interest include, but are not limited to:

- Access control
- Applied cryptography
- Automated protocols analysis
- Biometric security and privacy
- Complex systems security
- Critical infrastructure protection
- Cryptographic primitives and protocols
- Data protection
- Database and system security
- Digital rights management
- Email and web security
- Identity management
- Intellectual property protection
- Internet fraud
- Intrusion detection and prevention
- Key management
- Malware
- Network security protocols
- Privacy, anonymity, and untraceability
- Privacy-enhancing technology
- Protection for the future Internet
- Secure mobile agents and mobile code
- Security and privacy in cloud and grid systems
- Security and privacy in smart grids
- Security and privacy in wireless networks
- Security and privacy metrics
- Security in distributed systems
- Security in e-commerce
- Security in P2P systems
- Security in pervasive/ubiquitous computing
- Trust management
- Usability and security


SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap with papers that
have already been published, or are simultaneously submitted to
a journal or a conference with proceedings. All submissions should
be appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should be
at most 18 pages for research track and at most 8 pages for industry
track, including the bibliography and well-marked appendices, and
should follow Springer's LNCS style. Submissions are to be made
through the submission web page at http://acns2013.cpsc.ucalgary.ca/.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 1, 2013 (11:59
Pacific Time). Authors should indicate whether their submission
should be considered for the best student paper award; any paper
co-authored by at least a full time student is eligible for this
award. At least one author of a accepted paper must attend the
conference. Papers accepted for the research track will be
published in proceedings published by Springer's LNCS and
available at the conference. Extended versions of selected best
papers will be invited for a special issue in the Journal of
Computer Security.


IMPORTANT DATES
Submissions Due: February 1, 2013
Author Notification: April 10, 2013
Camera Ready Due: April 24, 2013


PROGRAM CHAIRS
Rei Safavi-Naini (University of Calgary, Canada)
Michael E. Locasto (University of Calgary, Canada)


GENERAL CHAIRS
Michael Jacobson (University of Calgary, Canada)
Payman Mohassel (University of Calgary, Canada)


PUBLICITY CHAIR
Mahabir Jhanwar (University of Calgary, Canada)


PROGRAM COMMITTEE
Bill Aiello (University of British Columbia, Canada)
Giuseppe Ateniese (Sapienza-U. of Rome, Italy & Johns Hopkins U., USA)
Kevin R. B. Butler (University of Oregon, USA)
Srdjan Capkun (ETH Zurich, Switzerland)
Alvaro A. Cárdenas (University of Texas at Dallas, USA)
Chen-Mou Cheng (National Taiwan University, Taiwan)
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)
Ed Dawson (Queensland University of Technology, Australia)
Roberto Di Pietro (Università Roma Tre, Italy)
José M. Fernandez (École Polytechnique de Montréal, Canada)
Sara Foresti (Università degli Studi di Milano, Italy)
Guang Gong (University of Waterloo, Canada)
Stefanos Gritzalis (University of the Aegean, Greece)
Guofei Gu (Texas A&M University, USA)
Angelos D. Keromytis (Columbia University, USA)
Evangelos Kranakis (Carleton University, Canada)
Ralf K usters (Universität Trier, Germany)
Xuejia Lai (Shanghai Jiao Tong University, China)
Cédric Lauradoux (INRIA, France)
Ninghui Li (Purdue University, USA)
Yingjiu Li (Singapore Management University, Singapore)
Mark Manulis (University of Surrey, UK)
Kaisa Nyberg (Aalto University, Finland)
Massimiliano Pala (Penango/OpenCA, USA)
Bart Preneel (KU Leuven, Belgium)
Christian Rechberger (DTU, Denmark)
Ahmad-Reza Sadeghi (Technische Universitãt Darmstadt, Germany)
Pierangela Samarati (Università degli Studi di Milano, Italy)
Radu Sion (Stony Brook University, USA)
Anil Somayaji (Carleton University, Canada)
Abhinav Srivastava (AT&T Research, USA)
Jessica Staddon (Google, USA)
Willy Susilo (University of Wollongong, Australia)
Gene Tsudik (UC Irvine, USA)
Duncan S. Wong (City University of Hong Kong, Hong Kong)
Jianying Zhou (I2R, Singapore)


This call for papers and additional information about the
conference can be found at http://acns2013.cpsc.ucalgary.ca

The history and statistics of ACNS can be found at ACNS Home
-- http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

ACNS forum at LinkedIn --
http://www.linkedin.com/groups/ACNS-Applied-Cryptography-Network-Security-4290836

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
SEAS 2025   14th International Conference on Software Engineering and Applications
SECRYPT 2025   22nd International Conference on Security and Cryptography
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 1)
IJCSITY 2024   International Journal of Computational Science and Information Technology
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI