posted by organizer: C2SI || 8215 views || tracked by 7 users: [display]

C2SI 2019 : 3rd International Conference on Codes, Cryptology and Information Security

FacebookTwitterLinkedInGoogle

Link: http://www.c2si-conference.org
 
When Apr 22, 2019 - Apr 24, 2019
Where Mohammed V University in Rabat
Submission Deadline Nov 30, 2018
Notification Due Jan 20, 2019
Final Version Due Feb 15, 2019
Categories    coding theory   cryptology   security   information
 

Call For Papers

CALL FOR PAPERS
===============

The third International Conference on Codes, Cryptology and Information Security (C2SI-2019) aims to bring together researchers in the fields of coding theory, cryptology and information Security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas.
The focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences in the following fields from academia, government, and industry presenting novel research.


TOPICS OF INTEREST
==================

Areas of interest include, but are not limited to:
Access Control Models
Applied Cryptography
Attacks & Malicious Code
Authentication, Identification
Block & Stream Ciphers
Blockchain Security and Privacy
Boolean Functions
Code-based Cryptography
Coding theory
Cryptanalysis
Cryptographic Algorithms and Primitives
Cryptographic Protocols
Data Protection
Denial of Service Protection
Elliptic-curve cryptography
Embedded System Security
Error correcting codes
Fingerprinting
Formal Methods for Security
Hash Functions
Identity and Security in IoT
Identity-based encryption (IBE)
Information Hiding
Information theory
Intrusion Detection & Prevention
Language-Based Security
Lattice-Based Cryptography
Malware Analysis and Detection
Mobile Agents Security
Mobile Security
Multivariate cryptography
Network Security
Post-Quantum cryptography
Public Key Cryptography
Quantum Cryptology
Random and pseudorandom generators
RFID security
Secure Distributed Computing
Security and Privacy for Big Data
Security and Privacy in the Cloud
Security Architectures
Security in Grid Computing
Security in Social Networks
Security in the Internet of Things
Security Models
Security Policies
Sensor Network Security
Side channel attacks
Signature, Integrity
Smart cards Security
Steganography
Watermarking
Wireless and Mobile Security


PAPER SUBMISSION
================

Submission to C2SI-2019 must be original and not substantially duplicate work that has been published or is simultaneously submitted to a journal or another conference/workshop with proceedings. Papers that contain any form of plagiarism or self-plagiarism will be rejected without reviews. All submissions will be blind-refereed.
All papers must be written in English, complete, intelligible and self-contained within at most 20 pages in Springer's Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. Information about the Springer LNCS format can be found at http://www.springer.de/comp/lncs/authors.html . Supplementary materials that facilitate verification of the results, e.g. source code, proof details, etc., may be appended without a page limit or uploaded as separate files, but reviewers are neither required to read them nor will they be printed in the proceedings. Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references. All submissions must be processed with LaTeX and follow Springer's LNCS format without changing default margins, fonts, fonts size, line spacing etc. Submissions not meeting these guidelines may be rejected without consideration of their merits. Papers must be submitted electronically in PDF format via easychair https://easychair.org/conferences/
At least one author of each accepted paper is required to register with the conference and present the paper. Papers which are not registred will not be included in the Proceeding. All accepted and registred papers will be published in the series LNCS like in C2SI-2015 and C2SI-2017. Proceedings will be available at the conference. Note that any submission to C2SI 2019 implies the full acknowledgment and commitment of the authors to the entire review process.


IMPORTANT DATES
===============

Submission deadline: November 30, 2018, 23:59 GMT
Notification to authors: January 20, 2019
Camera-Ready and Registration: February 15, 2019, 23:59 GMT
Conference: April 22 - 24 , 2019
Social event: April 24 - 27, 2019

Related Resources

LAJC 2024   Latin-American Journal of Computing
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
JMC 2024   JOURNAL OF MATHEMATICAL CRYPTOLOGY 2024
ISEEIE 2024   2024 4th International Symposium on Electrical, Electronics and Information Engineering (ISEEIE 2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
FCSIT 2024   2024 3rd Eurasian Conference on Frontiers of Computer Science and Information Technology
IITUPC 2024   Immunotherapy and Information Technology: Unleashing the Power of Convergence