posted by user: ChickenRun || 2569 views || tracked by 2 users: [display]

ICITS 2013 : The 7th International Conference on Information Theoretic Security

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Theoretic Security
 
Link: http://www.spms.ntu.edu.sg/mas/conference/icits2013/
 
When Nov 28, 2013 - Nov 30, 2013
Where Singapore
Submission Deadline Jul 12, 2013
Notification Due Aug 30, 2013
Final Version Due Sep 20, 2013
 

Call For Papers

This is the seventh in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptology. Papers on all technical aspects of information-theoretic security and quantum information-theoretic security are solicited for submission to ICITS 2013. Areas of interest include, but are not restricted to:

Unconditional security
Quantum cryptography
Authentication codes
Wiretap channels
Randomness extraction
Codes and cryptography
Lattices and cryptography
Secret sharing
Multiparty Computation
Bounded storage model
Oblivious transfer
Nonlocality and nonsignaling
Quantum information theory
Network coding security
Physical models and assumptions
Physical layer security
Important Dates

Conference Track submission deadline: Friday, July 5, 2013, 13.00 GMT Friday, July 12, 2013, 13.00 GMT
Conference Track notification: Friday, August 30, 2013
Proceedings version: Friday, September 20, 2013

Workshop Track submission deadline: Friday, August 2, 2013, 13.00 GMT
Workshop Track notification: Thursday, September 19, 2013

ICITS 2013 takes place just before Asiacrypt 2013 (December 1–5, Bangalore, India)
Two Tracks, Conference and Workshop

As in the previous edition of the conference, two types of contributed presentations will take place in ICITS 2013. The Conference Track will act as a traditional conference, consisting of original papers with published proceedings. The Workshop Track will operate more like an informal workshop, with papers that have appeared elsewhere or that consist of work in progress.

Conference Track (with proceedings) Submissions to this track must be original papers that have not previously appeared in published form. Accepted papers will be presented at the conference and will appear in the conference proceedings, which will be published by Springer in the Lecture Notes in Computer Science series.

Workshop Track (no proceedings) To encourage presentation of work form a variety of fields, especially those where conference publication is unusual or makes journal publication difficult, “work- shop track” papers are also solicited. Accepted papers will be presented at the conference, but will not appear in the proceedings. Submissions to this track that have previously appeared or are currently submitted elsewhere are acceptable, as long as they first appeared after January 1, 2012. Papers that describe work in progress are also welcome. The same standards of quality will apply to conference and workshop papers.

It is not possible to submit the same work for consideration in both tracks.

Related Resources

ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
ISC 2025   Information Security Conference
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
ICCNS--EI 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
ICCNS 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
ICCIP 2025   2025 The 11th International Conference on Communication and Information Processing (ICCIP 2025)
SPISCS 2025   2025 4th International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2025)
BDIOT 2025   2025 9th International Conference on Big Data and Internet of Things (BDIOT 2025)
INCC 2025   2025 the 3rd International Conference on Information Network and Computer Communications (INCC 2025)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications