posted by user: agervais || 1518 views || tracked by 7 users: [display]

CVC 2019 : CryptoValley Conference 2019

FacebookTwitterLinkedInGoogle

Link: https://www.cryptovalleyconference.com/
 
When Jun 24, 2019 - Jun 26, 2019
Where Zug, Switzerland
Submission Deadline Apr 15, 2019
Notification Due May 15, 2019
Final Version Due Jun 15, 2019
Categories    blockchain   distributed ledgers   security   privacy
 

Call For Papers

CryptoValley Conference - 2019

https://www.cryptovalleyconference.com/

=== Dates =====================================

15th March 2019 - Paper submission deadline
1st May 2019 - Author Notifications
1st June 2019 - Camera Ready due
24-26th June 2019 - Conference

=== Conference ================================

The emergence of Bitcoin and other blockchain-based system allow for entities to trade and interact without trusted third parties. This has led to exciting research in multiple academic disciplines and venues, as well as a vibrant startup rush.

The second CRYPTO VALLEY conference on Blockchain Technology, endorsed by IEEE, aims to unite interested scholars as well as industrial members from all relevant disciplines who study and work in the space of blockchain technology. Suggested contribution topics include (but are not limited to) empirical and theoretical studies of:

=== Topics ====================================

Attacks on anonymity and privacy
Big Data and blockchain technology
Case studies (e.g., of adoption, attacks, forks, scams, …)
Censorship
Consensus protocols for blockchains
Cryptocurrency adoption and economic impacts
Decentralized applications (Exchanges, Mining Pools, Trading Platforms)
Blockchain technology for developing countries
Economics and game theory for blockchains
Forensics and monitoring
Formal verification of protocols and smart contracts
Fraud detection and financial crime prevention
Governance
Identity, identification and trust in blockchain systems
Implications for existing business models
Interfacing fiat and cryptocurrencies
Intermediaries in different industries and their future
Internet of things (IoT) and blockchain technology
Legal, ethical and societal aspects of (decentralized) virtual currencies
Measurement studies and methodology
New applications of blockchain technology
Off-chain channels and layer-2 scaling
Peer-to-peer networks
Permissioned (e.g. Hyperledger) vs. permissionless (e.g. Bitcoin) blockchains
Privacy and anonymity-enhancing technologies
Proof-of-X-based consensus
Regulation and law enforcement
Relation to other payment systems
Scalability, sharding, and scalable services for blockchain systems
Smart contract programming languages and tools
Transaction graph analysis
Usability and user studies

=== Submissions ===============================

The conference solicits manuscripts in the following 4 categories:

**Full research papers**
which represent significant and novel research contributions. Submissions must not overlap with works that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should follow the IEEE Conference Proceedings Format format and should not exceed 10 pages, excluding references and well-marked appendices. There is no limit on the length of the references and appendices. Accepted papers will appear in the IEEE proceedings published by IEEE. Authors who seek to submit their works to journals may opt-out by publishing an extended abstract only.

**Short research papers**
which may (for example) summarize works-in-progress or extensions to previous research papers. Short research papers must meet the above criteria, except must be 4 pages or less including references and appendices.

**Systematization-of-Knowledge papers**
which present a systematization of the current literature on a specific topic. In line with the definition used by IEEE Security and Privacy, SoK papers must “provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate.”

**Position papers**
advance a novel viewpoint or opinion on the field that is not an original research contribution. Position papers should not exceed 6 pages in length, including any references and appendices.

All submissions will be reviewed double-blind, and as such should not contain author names, must be anonymous, no acknowledgments, affiliations, or obvious references. Accepted papers from the first edition are available under https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8525353.

Related Resources

ESORICS 2019   The 24th European Symposium on Research in Computer Security
cvc 2019   Computer Vision Conference (CVC) 2019
ISSRE 2019   The 30th International Symposium on Software Reliability Engineering (ISSRE) - IEEE
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
CCS - May 2019   CCS 2019 : 26th ACM Conference on Computer and Communications Security - May Deadline
GridCom 2019   11th International Conference on Grid Computing
ACITY 2019   9th International Conference on Advances in Computing and Information Technology
ICSS 2019   5th International Conference on Software Security
ICCSEA 2019   9th International Conference on Computer Science, Engineering and Applications
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things