会議情報
CANS 2016: International Conference on Cryptology and Network Security
会議のウェブサイトを表示するにはログインしてください
提出日: |
2016-07-06 |
通知日: |
2016-09-10 |
会議日: |
2016-11-14 |
場所: |
Milan, Italy |
年: |
15 |
閲覧: 20915 追跡: 6 出席: 0
論文募集
The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting cutting-edge results from world-renowned scientists in the area. Proceedings of CANS are published in the Lecture Notes in Computer Science series of Springer. They are distributed at the conference and are included in all major online databases.
The 15th edition of the conference will be held in Milan, Italy. Earlier editions of CANS were held in Taipei (2001), San Francisco (2002), Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), Hong Kong (2008), Kanazawa (2009), Kuala Lumpur (2010), Sanya (2011), Darmstadt (2012), Parary (2013), Crete (2014), and Marrakesh (2015). CANS 2016 is held in cooperation with the International Association of Cryptologic Research (IACR).
Overview
Papers offering novel research contributions are solicited for submission to the 15th International Conference on Cryptology and Network Security (CANS 2016). The focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers suggesting novel paradigms, original directions, or non-traditional perspectives.
Submitted papers must not substantially overlap with papers that have been published or that are submitted in parallel to a journal or a conference with formally published proceedings.
Topics of Interest
Access Control Network Security
Adware, Malware, and Spyware Peer-to-Peer Security
Anonymity & Pseudonymity Privacy
Applied cryptography Public Key Cryptography
Attacks & Malicious Code Security Architectures
Authentication, Identification Security and Privacy for Big Data
Biometrics Security and Privacy in the Cloud
Block & Stream Ciphers Security in Content Delivery Networks
Cryptographic Algorithms Security in Crowdsourcing
Cryptographic Protocols Security in Grid Computing
Cyberphysical Security Security in the Internet of Things
Data and Application Security Security in Location Services
Data and Computation Integrity Security in Pervasive and Ubiquitous Systems
Data Protection Security in Social Networks
Denial of Service Protection Security Metrics
Distributed Systems Security Security Models
Embedded System Security Security Policies
Formal Methods for Security Sensor Network Security
Hash Functions Spam & SPIT Protection
Identity Management Spyware Analysis and Detection
Language-Based Security Trust Management
(Future) Internet Security Usable Security
Key Management Virtual Private Networks
Mobile Security Wireless and Mobile Security
Multicast Security
Instructions for Authors
The submission should be at most 16 pages. The conference will also consider short submissions of up to 8 pages for results that are preliminary or that simply require few pages to describe. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a short paper (8 proceedings pages). Submitted papers should be intelligible and self-contained without appendices. Papers must be submitted only electronically. The electronic submission site is available at www.easychair.org)
Submissions must be anonymous (no author names, affiliations, acknowledgments, obvious references). At least one author of every accepted paper must register to the conference by the early registration deadline indicated by the organizers. Authors have to present their own paper. Papers without a registered author will be removed from the proceedings.
Accepted papers will be published in Springer's Lecture Notes in Computer Science (LNCS) and will be available at the conference. Papers should follow the formatting instructions of the Springer LNCS Style, at the time of submission.
The 15th edition of the conference will be held in Milan, Italy. Earlier editions of CANS were held in Taipei (2001), San Francisco (2002), Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), Hong Kong (2008), Kanazawa (2009), Kuala Lumpur (2010), Sanya (2011), Darmstadt (2012), Parary (2013), Crete (2014), and Marrakesh (2015). CANS 2016 is held in cooperation with the International Association of Cryptologic Research (IACR).
Overview
Papers offering novel research contributions are solicited for submission to the 15th International Conference on Cryptology and Network Security (CANS 2016). The focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers suggesting novel paradigms, original directions, or non-traditional perspectives.
Submitted papers must not substantially overlap with papers that have been published or that are submitted in parallel to a journal or a conference with formally published proceedings.
Topics of Interest
Access Control Network Security
Adware, Malware, and Spyware Peer-to-Peer Security
Anonymity & Pseudonymity Privacy
Applied cryptography Public Key Cryptography
Attacks & Malicious Code Security Architectures
Authentication, Identification Security and Privacy for Big Data
Biometrics Security and Privacy in the Cloud
Block & Stream Ciphers Security in Content Delivery Networks
Cryptographic Algorithms Security in Crowdsourcing
Cryptographic Protocols Security in Grid Computing
Cyberphysical Security Security in the Internet of Things
Data and Application Security Security in Location Services
Data and Computation Integrity Security in Pervasive and Ubiquitous Systems
Data Protection Security in Social Networks
Denial of Service Protection Security Metrics
Distributed Systems Security Security Models
Embedded System Security Security Policies
Formal Methods for Security Sensor Network Security
Hash Functions Spam & SPIT Protection
Identity Management Spyware Analysis and Detection
Language-Based Security Trust Management
(Future) Internet Security Usable Security
Key Management Virtual Private Networks
Mobile Security Wireless and Mobile Security
Multicast Security
Instructions for Authors
The submission should be at most 16 pages. The conference will also consider short submissions of up to 8 pages for results that are preliminary or that simply require few pages to describe. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a short paper (8 proceedings pages). Submitted papers should be intelligible and self-contained without appendices. Papers must be submitted only electronically. The electronic submission site is available at www.easychair.org)
Submissions must be anonymous (no author names, affiliations, acknowledgments, obvious references). At least one author of every accepted paper must register to the conference by the early registration deadline indicated by the organizers. Authors have to present their own paper. Papers without a registered author will be removed from the proceedings.
Accepted papers will be published in Springer's Lecture Notes in Computer Science (LNCS) and will be available at the conference. Papers should follow the formatting instructions of the Springer LNCS Style, at the time of submission.
最終更新 Xin Yao 2016-06-17
関連会議
関連仕訳帳
| CCF | 完全な名前 | インパクト ・ ファクター | 出版社 | ISSN |
|---|---|---|---|---|
| IEEE Transactions on Network Science and Engineering | 7.9 | IEEE | 2334-329X | |
| b | Neural Networks | 6.3 | Elsevier | 0893-6080 |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| IEEE Transactions on Control of Network Systems | 5.0 | IEEE | 2372-2533 | |
| Computer Law & Security Review | 3.2 | Elsevier | 0267-3649 | |
| c | Computer Law and Security Review | 3.2 | Elsevier | 0267-3649 |
| Optical Switching and Networking | 3.1 | Elsevier | 1573-4277 | |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| a | Journal of Cryptology | 2.2 | Springer | 0933-2790 |
| c | Mobile Networks and Applications | 2.0 | Springer | 1383-469X |