posted by user: agervais || 221 views || tracked by 2 users: [display]

CVC 2019 : CryptoValley Conference 2019


When Jun 24, 2019 - Jun 26, 2019
Where Zug, Switzerland
Submission Deadline Mar 15, 2019
Notification Due May 1, 2019
Final Version Due Jun 1, 2019
Categories    blockchain   distributed ledgers   security   privacy

Call For Papers

CryptoValley Conference - 2019

=== Dates =====================================

15th March 2019 - Paper submission deadline
1st May 2019 - Author Notifications
1st June 2019 - Camera Ready due
24-26th June 2019 - Conference

=== Conference ================================

The emergence of Bitcoin and other blockchain-based system allow for entities to trade and interact without trusted third parties. This has led to exciting research in multiple academic disciplines and venues, as well as a vibrant startup rush.

The second CRYPTO VALLEY conference on Blockchain Technology, endorsed by IEEE, aims to unite interested scholars as well as industrial members from all relevant disciplines who study and work in the space of blockchain technology. Suggested contribution topics include (but are not limited to) empirical and theoretical studies of:

=== Topics ====================================

Attacks on anonymity and privacy
Big Data and blockchain technology
Case studies (e.g., of adoption, attacks, forks, scams, …)
Consensus protocols for blockchains
Cryptocurrency adoption and economic impacts
Decentralized applications (Exchanges, Mining Pools, Trading Platforms)
Blockchain technology for developing countries
Economics and game theory for blockchains
Forensics and monitoring
Formal verification of protocols and smart contracts
Fraud detection and financial crime prevention
Identity, identification and trust in blockchain systems
Implications for existing business models
Interfacing fiat and cryptocurrencies
Intermediaries in different industries and their future
Internet of things (IoT) and blockchain technology
Legal, ethical and societal aspects of (decentralized) virtual currencies
Measurement studies and methodology
New applications of blockchain technology
Off-chain channels and layer-2 scaling
Peer-to-peer networks
Permissioned (e.g. Hyperledger) vs. permissionless (e.g. Bitcoin) blockchains
Privacy and anonymity-enhancing technologies
Proof-of-X-based consensus
Regulation and law enforcement
Relation to other payment systems
Scalability, sharding, and scalable services for blockchain systems
Smart contract programming languages and tools
Transaction graph analysis
Usability and user studies

=== Submissions ===============================

The conference solicits manuscripts in the following 4 categories:

**Full research papers**
which represent significant and novel research contributions. Submissions must not overlap with works that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should follow the IEEE Conference Proceedings Format format and should not exceed 10 pages, excluding references and well-marked appendices. There is no limit on the length of the references and appendices. Accepted papers will appear in the IEEE proceedings published by IEEE. Authors who seek to submit their works to journals may opt-out by publishing an extended abstract only.

**Short research papers**
which may (for example) summarize works-in-progress or extensions to previous research papers. Short research papers must meet the above criteria, except must be 4 pages or less including references and appendices.

**Systematization-of-Knowledge papers**
which present a systematization of the current literature on a specific topic. In line with the definition used by IEEE Security and Privacy, SoK papers must “provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate.”

**Position papers**
advance a novel viewpoint or opinion on the field that is not an original research contribution. Position papers should not exceed 6 pages in length, including any references and appendices.

All submissions will be reviewed double-blind, and as such should not contain author names, must be anonymous, no acknowledgments, affiliations, or obvious references. Accepted papers from the first edition are available under

Related Resources

ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
cvc 2019   Computer Vision Conference (CVC) 2019
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
TrustCom 2019   The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
ESORICS 2019   The 24th European Symposium on Research in Computer Security
Blockchain 2019   The 2019 IEEE International Conference on Blockchain
DBSEC 2019   33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
SPIoT 2019   8th International Symposium on Security & Privacy on Internet of Things
MoWIN 2019   8th International Conference on Mobile & Wireless Networks