posted by user: agervais || 2655 views || tracked by 5 users: [display]

CVC 2019 : CryptoValley Conference 2019

FacebookTwitterLinkedInGoogle

Link: https://www.cryptovalleyconference.com/
 
When Jun 24, 2019 - Jun 26, 2019
Where Zug, Switzerland
Submission Deadline Apr 15, 2019
Notification Due May 15, 2019
Final Version Due Jun 15, 2019
Categories    blockchain   distributed ledgers   security   privacy
 

Call For Papers

CryptoValley Conference - 2019

https://www.cryptovalleyconference.com/

=== Dates =====================================

15th March 2019 - Paper submission deadline
1st May 2019 - Author Notifications
1st June 2019 - Camera Ready due
24-26th June 2019 - Conference

=== Conference ================================

The emergence of Bitcoin and other blockchain-based system allow for entities to trade and interact without trusted third parties. This has led to exciting research in multiple academic disciplines and venues, as well as a vibrant startup rush.

The second CRYPTO VALLEY conference on Blockchain Technology, endorsed by IEEE, aims to unite interested scholars as well as industrial members from all relevant disciplines who study and work in the space of blockchain technology. Suggested contribution topics include (but are not limited to) empirical and theoretical studies of:

=== Topics ====================================

Attacks on anonymity and privacy
Big Data and blockchain technology
Case studies (e.g., of adoption, attacks, forks, scams, …)
Censorship
Consensus protocols for blockchains
Cryptocurrency adoption and economic impacts
Decentralized applications (Exchanges, Mining Pools, Trading Platforms)
Blockchain technology for developing countries
Economics and game theory for blockchains
Forensics and monitoring
Formal verification of protocols and smart contracts
Fraud detection and financial crime prevention
Governance
Identity, identification and trust in blockchain systems
Implications for existing business models
Interfacing fiat and cryptocurrencies
Intermediaries in different industries and their future
Internet of things (IoT) and blockchain technology
Legal, ethical and societal aspects of (decentralized) virtual currencies
Measurement studies and methodology
New applications of blockchain technology
Off-chain channels and layer-2 scaling
Peer-to-peer networks
Permissioned (e.g. Hyperledger) vs. permissionless (e.g. Bitcoin) blockchains
Privacy and anonymity-enhancing technologies
Proof-of-X-based consensus
Regulation and law enforcement
Relation to other payment systems
Scalability, sharding, and scalable services for blockchain systems
Smart contract programming languages and tools
Transaction graph analysis
Usability and user studies

=== Submissions ===============================

The conference solicits manuscripts in the following 4 categories:

**Full research papers**
which represent significant and novel research contributions. Submissions must not overlap with works that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should follow the IEEE Conference Proceedings Format format and should not exceed 10 pages, excluding references and well-marked appendices. There is no limit on the length of the references and appendices. Accepted papers will appear in the IEEE proceedings published by IEEE. Authors who seek to submit their works to journals may opt-out by publishing an extended abstract only.

**Short research papers**
which may (for example) summarize works-in-progress or extensions to previous research papers. Short research papers must meet the above criteria, except must be 4 pages or less including references and appendices.

**Systematization-of-Knowledge papers**
which present a systematization of the current literature on a specific topic. In line with the definition used by IEEE Security and Privacy, SoK papers must “provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate.”

**Position papers**
advance a novel viewpoint or opinion on the field that is not an original research contribution. Position papers should not exceed 6 pages in length, including any references and appendices.

All submissions will be reviewed double-blind, and as such should not contain author names, must be anonymous, no acknowledgments, affiliations, or obvious references. Accepted papers from the first edition are available under https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8525353.

Related Resources

SP 2020   IEEE Symposium on Security and Privacy
cvc 2019   Computer Vision Conference (CVC) 2019
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
BSP-IoT 2020   Blockchain Security and Privacy for the Internet of Things
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
ICBC 2020   IEEE International Conference on Blockchain and Cryptocurrency 2020
IEEE Euro S&P 2020   5th IEEE European Symposium on Security and Privacy
IJMPICT 2019   International Journal of Managing Public Sector Information and Communication Technologies
SIPRO 2020   6th International Conference on Signal and Image Processing
ICCSP--Ei Compendex and Scopus 2020   2020 4th International Conference on Cryptography, Security and Privacy (ICCSP 2020)--Ei Compendex and Scopus