ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ACNS 2017 - 15th International Conference on Applied Cryptography and Network Security

Date2017-07-10 - 2017-07-12

Deadline2017-02-03

VenueKanazawa, Japan Japan

Keywords

Websitehttps://cy2sec.comm.eng.osaka-u.ac.jp/acns2017

Topics/Call fo Papers

15th International Conference on Applied Cryptography and Network Security (ACNS2017) will be held in Kanazawa, Japan on July 2017. It will be organized by Japan Advanced Institute of Science and Technology (JAIST) and Osaka University.
ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. Both academic research works with high relevance to real-world problems as well as developments in industrial and technical frontiers fall within the scope of the conference.
The previous ACNS conference series were successfully held in Kunming, China (2003), Yellow Mountain, China (2004), New York, USA (2005), Singapore (2006), Zhuhai, China (2007), New York, USA (2008), Paris, France (2009), Beijing, China (2010), Malaga, Spain (2011), Singapore (2012), Banff, Canada (2013), Lausanne, Switzerland (2014), New York, USA (2015) and London, UK (2016). The conference proceedings are published in LNCS series.
Conference Topics
Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (including performance measurements, usability studies) of algorithms / protocols / standards / implementations / technologies / devices / systems, standing in close relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include, but are not limited to:
Access control Future Internet security Pervasive security
Applied cryptography Identity management Security in e-commerce
Automated security analysis IP protection Security in P2P systems
Complex systems security Internet fraud, cybercrime Security in grid systems
Critical infrastructures Internet-of-Things security Cloud security/privacy
Cryptographic primitives Intrusion detection Security/privacy metrics
Cryptographic protocols Key management Trust management
Data protection Malware Ubiquitous security/privacy
Database/system security Mobile/wireless/5G security Human factors in security
Digital rights management Network security protocols Usability in security/privacy
Email and web security Privacy/anonymity, PETs

Last modified: 2016-11-21 22:50:23