ASIAPKC 2014 - 2014 ACM Asia Public Key Cryptography Workshop (ASIAPKC'14)
Topics/Call fo Papers
Public key cryptography plays an essential role in ensuring a variety of security properties of data processing of various kinds. The theme of this workshop is focused on novel public key cryptosystems for solving a wide range of real-life application problems. This workshop solicits original contributions on both applied and theoretic aspects of public key cryptography.
The proceedings will be published by ACM Press and appear in ACM digital library (as with the ACM ASIACCS 2014 and 1st ASIAPKC proceedings). Submitted papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages in total. Camera-ready version must be no longer than 10 pages in ACM's standard double-column format.
Topics of interest to the workshop include, but are not limited to:
Applied public-key cryptography for solving emerging application problemsProvably-secure public-key primitives and protocolsKey management for, and by, public-key cryptosystemsPrivacy-preserving cryptographic computationsTwo-party and multi-party computationsHomomorphic public-key cryptosystemsAttributed-based and functional public-key cryptographyDigital signatures with special propertiesSystem security properties of public-key cryptography Post-quantum public-key cryptography Fast implementation of public-key cryptosystems
Contact E-mail: asiapkc2014-AT-ml.nict.go.jp
The proceedings will be published by ACM Press and appear in ACM digital library (as with the ACM ASIACCS 2014 and 1st ASIAPKC proceedings). Submitted papers must be no longer than 10 pages excluding references and appendices, and no longer than 12 pages in total. Camera-ready version must be no longer than 10 pages in ACM's standard double-column format.
Topics of interest to the workshop include, but are not limited to:
Applied public-key cryptography for solving emerging application problemsProvably-secure public-key primitives and protocolsKey management for, and by, public-key cryptosystemsPrivacy-preserving cryptographic computationsTwo-party and multi-party computationsHomomorphic public-key cryptosystemsAttributed-based and functional public-key cryptographyDigital signatures with special propertiesSystem security properties of public-key cryptography Post-quantum public-key cryptography Fast implementation of public-key cryptosystems
Contact E-mail: asiapkc2014-AT-ml.nict.go.jp
Other CFPs
- Workshop on Visible Light Communication for Vehicular Networks (VLCVN 2014)
- The Second International Workshop on Vehicular Traffic Management for Smart Cities (VTM 2014)
- 2014 IEEE VTC Workshop on Emerging Technologies: Wireless Power (2014 IEEE VTC-WoW)
- 2014 IEEE 79th Vehicular Technology Conference
- The 2nd International Workshop on 5G Mobile and Wireless Communication System for 2020 and Beyond (MWC2020)
Last modified: 2014-01-18 21:46:08