CANS 2024 - International Conference on Cryptology and Network Security
Topics/Call fo Papers
- Access Control
- Anonymity and Censorship Resistance
- Applied Cryptography
- Artificial Intelligence for Security
- Attacks & Malicious Code
- Biometrics
- Block & Stream Ciphers
- Blockchain Security and Privacy
- Cognitive Cities Security and Privacy
- Confidential Computing
- Cryptographic Algorithms and Primitives
- Cryptographic Protocols
- Cyber Physical Security
- Data and Application Security
- Denial of Service Protection
- Data and Computation Integrity
- Edge/Fog Computing Security and Privacy
- Embedded System Security
- Formal Methods for Security and Privacy
- Hash Functions
- Identity Management and Privacy
- IoT Security
- Key Management
- Location Based Services Security and Privacy
- Malware Analysis and Detection
- Network Security
- On-line Social Networks Security and Privacy
- Peer-to-Peer Security and Privacy
- Privacy-Enhancing Technologies
- Public Key Cryptography
- Security and Privacy for Big Data
- Security and Privacy in the Cloud
- Security and Privacy of ML and AI based Systems
- Security and Resilient solutions for Critical Infrastructures
(e.g., Smart Grid, TelCo Networks, AirPorts, Ports…)
- Security Architectures
- Security in Content Delivery
- Security Models
- Secure Multi-Party Computation
- Secure Distributed Computing
- Security in Pervasive Systems
- Sensor Network Security
- Security in Crowdsourcing
- Trust Management
- Usable Security
- Virtual Private Networks
- Web Security
- Wireless and Mobile Security
- Zero-Knowledge Proofs
- Anonymity and Censorship Resistance
- Applied Cryptography
- Artificial Intelligence for Security
- Attacks & Malicious Code
- Biometrics
- Block & Stream Ciphers
- Blockchain Security and Privacy
- Cognitive Cities Security and Privacy
- Confidential Computing
- Cryptographic Algorithms and Primitives
- Cryptographic Protocols
- Cyber Physical Security
- Data and Application Security
- Denial of Service Protection
- Data and Computation Integrity
- Edge/Fog Computing Security and Privacy
- Embedded System Security
- Formal Methods for Security and Privacy
- Hash Functions
- Identity Management and Privacy
- IoT Security
- Key Management
- Location Based Services Security and Privacy
- Malware Analysis and Detection
- Network Security
- On-line Social Networks Security and Privacy
- Peer-to-Peer Security and Privacy
- Privacy-Enhancing Technologies
- Public Key Cryptography
- Security and Privacy for Big Data
- Security and Privacy in the Cloud
- Security and Privacy of ML and AI based Systems
- Security and Resilient solutions for Critical Infrastructures
(e.g., Smart Grid, TelCo Networks, AirPorts, Ports…)
- Security Architectures
- Security in Content Delivery
- Security Models
- Secure Multi-Party Computation
- Secure Distributed Computing
- Security in Pervasive Systems
- Sensor Network Security
- Security in Crowdsourcing
- Trust Management
- Usable Security
- Virtual Private Networks
- Web Security
- Wireless and Mobile Security
- Zero-Knowledge Proofs
Other CFPs
- The 11th International Conference on Arts & Humanities (ICOAH) 2024
- 2024 IEEE 5th International Conference on Computer Vision, Image and Deep Learning
- 新加坡学术出版社(Academic Publishing Pte. Ltd.)外文期刊征稿
- 2024 International Conference on Pattern Analysis and Machine Intelligence (ICPAMI 2024)
- The 2024 International Conference on Big Data Analysis and Application (ICBDAA 2024)
Last modified: 2024-03-16 01:21:55