Conference Information
CANS 2016 : International Conference on Cryptology and Network Security
Submission Date:
Notification Date:
Conference Date:
Milan, Italy
Viewed: 6053   Tracked: 4   Attend: 0

Conference Location
Call For Papers
The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting cutting-edge results from world-renowned scientists in the area. Proceedings of CANS are published in the Lecture Notes in Computer Science series of Springer. They are distributed at the conference and are included in all major online databases.

The 15th edition of the conference will be held in Milan, Italy. Earlier editions of CANS were held in Taipei (2001), San Francisco (2002), Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), Hong Kong (2008), Kanazawa (2009), Kuala Lumpur (2010), Sanya (2011), Darmstadt (2012), Parary (2013), Crete (2014), and Marrakesh (2015). CANS 2016 is held in cooperation with the International Association of Cryptologic Research (IACR).


Papers offering novel research contributions are solicited for submission to the 15th International Conference on Cryptology and Network Security (CANS 2016). The focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers suggesting novel paradigms, original directions, or non-traditional perspectives.

Submitted papers must not substantially overlap with papers that have been published or that are submitted in parallel to a journal or a conference with formally published proceedings.

Topics of Interest

Access Control 	Network Security
Adware, Malware, and Spyware 	Peer-to-Peer Security
Anonymity & Pseudonymity 	Privacy
Applied cryptography 	Public Key Cryptography
Attacks & Malicious Code 	Security Architectures
Authentication, Identification 	Security and Privacy for Big Data
Biometrics 	Security and Privacy in the Cloud
Block & Stream Ciphers 	Security in Content Delivery Networks
Cryptographic Algorithms 	Security in Crowdsourcing
Cryptographic Protocols 	Security in Grid Computing
Cyberphysical Security 	Security in the Internet of Things
Data and Application Security 	Security in Location Services
Data and Computation Integrity 	Security in Pervasive and Ubiquitous Systems
Data Protection 	Security in Social Networks
Denial of Service Protection 	Security Metrics
Distributed Systems Security 	Security Models
Embedded System Security 	Security Policies
Formal Methods for Security 	Sensor Network Security
Hash Functions 	Spam & SPIT Protection
Identity Management 	Spyware Analysis and Detection
Language-Based Security 	Trust Management
(Future) Internet Security 	Usable Security
Key Management 	Virtual Private Networks
Mobile Security 	Wireless and Mobile Security
Multicast Security 		
Instructions for Authors

The submission should be at most 16 pages. The conference will also consider short submissions of up to 8 pages for results that are preliminary or that simply require few pages to describe. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a short paper (8 proceedings pages). Submitted papers should be intelligible and self-contained without appendices. Papers must be submitted only electronically. The electronic submission site is available at

Submissions must be anonymous (no author names, affiliations, acknowledgments, obvious references). At least one author of every accepted paper must register to the conference by the early registration deadline indicated by the organizers. Authors have to present their own paper. Papers without a registered author will be removed from the proceedings.

Accepted papers will be published in Springer's Lecture Notes in Computer Science (LNCS) and will be available at the conference. Papers should follow the formatting instructions of the Springer LNCS Style, at the time of submission. 
Last updated by Xin Yao in 2016-06-17
Related Publications
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ba2CODES+ISSSInternational Conference on Hardware/Software Codesign and System Synthesis2017-03-31 2017-10-15
CyberSafetyInternational Workshop on Computational Methods for CyberSafety2016-08-252016-09-102016-10-28
cTAPIARichard Tapia Celebration of Diversity in Computing Conference  2016-09-14
PRDCIEEE Pacific Rim International Symposium on Dependable Computing2016-07-152016-09-102017-01-22
ccb1MMMInternational Conference on MultiMedia Modeling2017-09-152017-11-032018-02-05
bb4WAOAWorkshop on Approximation and Online Algorithms2015-06-192015-07-242015-09-17
aDBSecIFIP WG 11.3 Conference on Data and Applications Security and Privacy2017-03-162017-04-262017-07-19
IEEE Inertial SensorsInternational Symposium on Inertial Sensors and Systems2016-10-012016-12-012017-03-28
ICCS'''IEEE International Conference on Circuits Systems2017-10-312017-11-102017-12-20
ICMICInternational Conference on Mobile IT Convergence2013-05-152013-05-302013-07-03
Related Journals
CCFFull NameImpact FactorPublisherISSN
International Journal of Network Security & Its Applications AIRCC0975-2307
cJournal of Internet Security DDSecure.Net Inc.1206-4890
aJournal of Cryptology1.021Springer0933-2790
International journal of Software Engineering & Applications AIRCC0976-2221
Computer Law and Security Review0.373ELSEVIER0267-3649
bJournal of Computer Security IOS Press0926-227X
bComputers & Security2.849ELSEVIER0167-4048
cNetworking Science Springer2076-0310
bNeural Networks3.216ELSEVIER0893-6080
Computer Methods in Applied Mechanics and Engineering3.467ELSEVIER0045-7825