posted by user: naoto_yanai || 23669 views || tracked by 27 users: [display]

ACNS 2017 : The 15th International Conference on Applied Cryptography and Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Applied Cryptography and Network Security
 
Link: https://cy2sec.comm.eng.osaka-u.ac.jp/acns2017/
 
When Jul 10, 2017 - Jul 12, 2017
Where Kanazawa, Japan
Submission Deadline Feb 3, 2017
Notification Due Apr 7, 2017
Final Version Due Apr 17, 2017
Categories    information security   cryptography   network security   privacy
 

Call For Papers

The 15th International Conference on Applied Cryptography and Network Security (ACNS2017) will be held in Kanazawa, Japan in July 2017. It will be organized by Japan Advanced Institute of Science and Technology (JAIST) and Osaka University.

ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. Both academic research works with high relevance to real-world problems as well as developments in industrial and technical frontiers fall within the scope of the conference.

Previous events in the ACNS conference series were successfully held in Kunming, China (2003), Yellow Mountain, China (2004), New York, USA (2005), Singapore (2006), Zhuhai, China (2007), New York, USA (2008), Paris, France (2009), Beijing, China (2010), Malaga, Spain (2011), Singapore (2012), Banff, Canada (2013), Lausanne, Switzerland (2014), New York, USA (2015) and London, UK (2016). The conference proceedings are published in the LNCS series.

Conference Topics:
Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (including performance measurements, usability studies) of algorithms / protocols / standards / implementations / technologies / devices / systems, standing in close relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include, but are not limited to:

•Access control
•Applied cryptography
•Automated security analysis
•Complex systems security
•Critical infrastructures
•Cryptographic primitives
•Cryptographic protocols
•Data protection
•Database/system security
•Digital rights management
•Email and web security
•Future Internet security
•Identity management
•IP protection
•Internet fraud, cybercrime
•Internet-of-Things security
•Intrusion detection
•Key management
•Malware
•Mobile/wireless/5G security
•Network security protocols
•Privacy/anonymity, PETs
•Pervasive security
•Security in e-commerce
•Security in P2P systems
•Security in grid systems
•Cloud security/privacy
•Security/privacy metrics
•Trust management
•Ubiquitous security/privacy
•Human factors in security
•Usability in security/privacy

Important dates and deadlines:
Submission: 03 February 2017 23:59 JST
Notification: 07 April 2017
Final version: 17 April 2017

Instructions for Authors:
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other conference or workshop with proceedings. Submissions should be anonymous, with no author names, affiliations, acknowledgement or obvious references. Submissions should have at most 16 pages (excl. bibliography and appendix), and at most 30 pages in total, using at least 11-point fonts and with reasonable margins. Please number the pages in submissions. The total length of the final versions for Springer's LNCS is at most 18 pages. Committee members are not required to read appendices; the paper should be intelligible without them. At least one author of each accepted paper must register with the conference and present the paper. Submissions must be submitted electronically in PDF format, and the submission procedure and the submission link are announced at the web page. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. It is strongly encouraged that submissions be processed in LaTeX.

Conference Venue:
Kanazawa is one of the most historical cities in Japan. It is famous for Kenrokuen Garden and Kanazawa Castle Park. In particular, Kenrokuen Garden is one of the three greatest gardens in Japan. The conference venue is next to these two places. It is located at the most beautiful area in Kanazawa. The conference venue is located approximately 3 kilometers south of Kanazawa Station.


General Chair:
Hiroaki Kikuchi (Meiji University, Japan)

Program Co-Chairs:
Atsuko Miyaji (Osaka University/JAIST, Japan)
Dieter Gollmann (Hamburg University of Technology, Germany)


Program Committee: (*Note that Program Committee members will increase further.)
Giuseppe Ateniese (Stevens Institute of Technology, USA)
Man Ho Au (Hong Kong Polytechnic University, Hong Kong)
Liqun Chen (Hewlett-Packard Laboratories, UK)
Céline Chevalier (Université Panthéon-Assas, France)
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)
Mauro Conti (University of Padua, Italy)
Alexandra Dmitrienko (Fraunhofer SIT, Germany)
Michael Franz (University of California, Irvine, USA)
Sebastian Gajek (NEC Research Labs, Germany)
Feng Hao (Newcastle University, UK)
Swee-Huay Heng (Multimedia University, Malaysia)
Xinyi Huang (Fujian Normal University, China)
Michael Huth (Imperial College London, UK)
Tibor Jager (Ruhr University Bochum, Germany)
Aniket Kate (Saarland University, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Kwangjo Kim (KAIST, Korea)
Kwok-yan Lam (NTU, Singapore)
Helger Lipmaa (Cybernetica AS, Estonia)
Mark Manulis (University of Surrey, UK)
Ivan Martinovic (University of Oxford, UK)
Jörn Müller-Quade (Karlsruhe Institute of Technology, Germany)
David Naccache (Ecole Normale Superieure, France)
Michael Naehrig (Microsoft Research Redmond, USA)
Hamed Okhravi (MIT Lincoln Laboratory, USA)
Panos Papadimitratos (KTH Royal Institute of Technology, Sweden)
Jong Hwan Park (Sangmyung University, Korea)
Thomas Peyrin (Nanyang Technological University, Singapore)
Bertram Poettering (Ruhr-Universität Bochum, Germany)
Christina Pöpper (NYU, United Arab Emirates)
Thomas Schneider (TU Darmstadt, Germany)
Michael Scott (Dublin City University, Ireland)
Vanessa Teague (University of Melbourne, Australia)
Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan)
Ivan Visconti (University of Salerno, Italy)
Bo-Yin Yang (Academia Sinica, Taiwan)
Fangguo Zhang (Sun Yat-sen University, China)
Jianying Zhou (Institute for Infocomm Research, Singapore)


Organizing Committee:
Keita Emura (NICT, Japan)
Masaki Fujikawa (Kogakuin University, Japan)
Yuichi Futa (JAIST, Japan)
Masaki Hashimoto (IISEC, Japan)
Shoichi Hirose (University of Fukui, Japan)
Noritaka Inagaki (IPA, Japan)
Atsuo Inomata (Tokyo Denki University/NAIST, Japan)
Akinori Kawachi (Tokushima University, Japan)
Ryo Kikuchi (NTT, Japan)
Minoru Kuribayashi (Okayama University, Japan)
Kaitai Liang (Manchester Metropolitan University, UK)
Natsume Matsuzaki (University of Nagasaki, Japan)
Hideyuki Miyake (Toshiba, Japan)
Toru Nakamura (KDDI Research, Japan)
Takashi Nishide (University of Tsukuba, Japan)
Takeshi Okamoto (Tsukuba University of Technology, Japan)
Kazumasa Omote (University of Tsukuba, Japan)
Masaaki Shirase (Future University Hakodate, Japan)
Chunhua Su (Osaka University, Japan)
Yuji Suga (IIJ, Japan)
Eiji Takimoto (Ritsumeikan University, Japan)
Satoru Tanaka (Osaka University, Japan)
Dai Watanabe (Hitachi, Japan)
Takumi Yamamoto (Mitsubishi Electric, Japan)
Toshihiro Yamauchi (Okayama University, Japan)
Naoto Yanai (Osaka University, Japan)
Kenji Yasunaga (Kanazawa University, Japan)

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
SECRYPT 2025   22nd International Conference on Security and Cryptography
SEAS 2025   14th International Conference on Software Engineering and Applications
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 1)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)