ACNS 2011 - 9th International Conference on Applied Cryptography and Network Security
Date2011-06-07
Deadline2011-01-21
VenueNerja, Spain
KeywordsSecurity; Cryptography; Network security protocols; Privacy; Trust; Security in Internet; PKI; Certification; Security and privacy in sensor, mobile, ad hoc and delay-tolerant networks, p2p systems and wireless communications
Topics/Call fo Papers
ACNS 2011: CALL FOR PAPERS
http://www.isac.uma.es/acns2011/
Location: Nerja, Malaga, Spain
Date: June 7-10, 2011
Submission Deadline: January 21, 2011, midnight PDT
Author Notification: March 22, 2011
Camera-Ready Deadline: April 10, 2011
Program Chairs: Javier Lopez & Gene Tsudik
General Chairs: Roberto di Pietro & Rodrigo Roman
Publicity Chairs: Cristina Alcaraz & Claudio Soriente
Web Chair: Ersin Uzun
[TOPICS]
Original papers on all aspects of applied cryptography as well as
computer/network security and privacy are solicited. Topics of interest
include, but are not limited, to:
* Applied cryptography and cryptographic protocols
* Cryptographic primitives, e.g., cryptosystems, ciphers
and hash functions
* Network security protocols
* Privacy, anonymity and untraceability
* Security for the next-generation Internet
* Internet fraud, e.g., phishing, pharming, spam, and click fraud
* Email and web security
* Public key infrastructures, key management, certification
and revocation
* Trust and its metrics
* Usable security and cryptography
* Intellectual property protection and digital rights management
* Modeling and protocol design
* Automated protocols analysis
* Secure virtualization and security in cloud computing
* Security and privacy in sensor, mobile, ad hoc and delay-tolerant
networks, p2p systems, as well as wireless (e.g., RFID, Bluetooth)
communications.
[SCOPE]
Papers suggesting novel paradigms, original directions, or non-traditional
perspectives are especially welcome. As in previous years, there will be an
academic track and an industrial track. Submissions to the former should
emphasize research contributions, while submissions to the latter may focus
on implementation and deployment of real-world systems. The academic track
will have proceedings published as part of the Springer LNCS series and will
be available at the conference. The industrial track will only have
presentations without formal proceedings.
[SUBMISSION]
Each submission must be thoroughly anonymized, with no author names,
affiliations, acknowledgements, or obvious references. It should begin with a
title, a short abstract, and a list of meaningful keywords. Submissions must
not duplicate work that was published elsewhere, or work that has been
submitted in parallel to any other conference, journal or workshop that has
proceedings.
All submissions are limited to 18 pages in the llncs style, including
bibliography and any appendices; each submission must be intelligible and
self-contained within this length. Submissions not meeting these guidelines
will be rejected without review.
Authors should indicate whether their submission should be considered for
the best student paper award; any paper co-authored by a full-time student
is eligible. Authors of accepted papers must guarantee that their paper will
be presented at the conference.
[JOURNAL INFORMATION]
Authors of selected papers will be invited to submit extended versions of
their ACNS'11 papers to a Special Issue of the International Journal of
Information Security (IJIS).
[IMPORTANT DATES]
Submission Deadline: January 21, 2011, midnight PDT
Author Notification Date: March 22, 2011
Final Version Deadline: April 10, 2011
Conference: June 7-10, 2011
[PROGRAM COMMITTEE]
To Be Announced.
[ACNS Home: http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_...]
http://www.isac.uma.es/acns2011/
Location: Nerja, Malaga, Spain
Date: June 7-10, 2011
Submission Deadline: January 21, 2011, midnight PDT
Author Notification: March 22, 2011
Camera-Ready Deadline: April 10, 2011
Program Chairs: Javier Lopez & Gene Tsudik
General Chairs: Roberto di Pietro & Rodrigo Roman
Publicity Chairs: Cristina Alcaraz & Claudio Soriente
Web Chair: Ersin Uzun
[TOPICS]
Original papers on all aspects of applied cryptography as well as
computer/network security and privacy are solicited. Topics of interest
include, but are not limited, to:
* Applied cryptography and cryptographic protocols
* Cryptographic primitives, e.g., cryptosystems, ciphers
and hash functions
* Network security protocols
* Privacy, anonymity and untraceability
* Security for the next-generation Internet
* Internet fraud, e.g., phishing, pharming, spam, and click fraud
* Email and web security
* Public key infrastructures, key management, certification
and revocation
* Trust and its metrics
* Usable security and cryptography
* Intellectual property protection and digital rights management
* Modeling and protocol design
* Automated protocols analysis
* Secure virtualization and security in cloud computing
* Security and privacy in sensor, mobile, ad hoc and delay-tolerant
networks, p2p systems, as well as wireless (e.g., RFID, Bluetooth)
communications.
[SCOPE]
Papers suggesting novel paradigms, original directions, or non-traditional
perspectives are especially welcome. As in previous years, there will be an
academic track and an industrial track. Submissions to the former should
emphasize research contributions, while submissions to the latter may focus
on implementation and deployment of real-world systems. The academic track
will have proceedings published as part of the Springer LNCS series and will
be available at the conference. The industrial track will only have
presentations without formal proceedings.
[SUBMISSION]
Each submission must be thoroughly anonymized, with no author names,
affiliations, acknowledgements, or obvious references. It should begin with a
title, a short abstract, and a list of meaningful keywords. Submissions must
not duplicate work that was published elsewhere, or work that has been
submitted in parallel to any other conference, journal or workshop that has
proceedings.
All submissions are limited to 18 pages in the llncs style, including
bibliography and any appendices; each submission must be intelligible and
self-contained within this length. Submissions not meeting these guidelines
will be rejected without review.
Authors should indicate whether their submission should be considered for
the best student paper award; any paper co-authored by a full-time student
is eligible. Authors of accepted papers must guarantee that their paper will
be presented at the conference.
[JOURNAL INFORMATION]
Authors of selected papers will be invited to submit extended versions of
their ACNS'11 papers to a Special Issue of the International Journal of
Information Security (IJIS).
[IMPORTANT DATES]
Submission Deadline: January 21, 2011, midnight PDT
Author Notification Date: March 22, 2011
Final Version Deadline: April 10, 2011
Conference: June 7-10, 2011
[PROGRAM COMMITTEE]
To Be Announced.
[ACNS Home: http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_...]
Other CFPs
- 9th Asian Congress of Neurological Surgeons
- CFC: Wireless Sensor Networks and Energy Efficiency: Protocol, Routing and Management
- 2011 International Conference on Economics, Trade and Development
- ITEC 2011: Europe's leading conference and exhibition presenting continuous innovations in training and simulation
- MBMV 2011 : 14. Workshop Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen
Last modified: 2010-10-06 22:27:51