Conference Information
ACNS 2018 : International Conference on Applied Cryptography and Network Security
https://www.cosic.esat.kuleuven.be/events/acns2018/
Submission Date:
2018-01-26
Notification Date:
2018-03-31
Conference Date:
2018-07-02
Location:
Leuven, Belgium
Years:
16
CCF: c   CORE: b   QUALIS: b1   Viewed: 13140   Tracked: 36   Attend: 4

Conference Location
Advertisment
Call For Papers
The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. The conference will be organised by the Computer Security and Industrial Cryptography (COSIC) group at KU Leuven. The proceedings of ACNS 2018 will be published by Springer.

ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.

The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include but are not limited to:

    Access control
    Applied cryptography
    Automated security analysis
    Biometric security/privacy
    Block chain and cryptocurrencies
    Cloud security/privacy
    Complex systems security
    Critical infrastructure
    Cryptographic primitives
    Cryptographic protocols
    Data protection
    Database/system security
    Digital rights management
    Email, app and web security
    Future Internet security
    Human factors in security
    Identity management
    IP protection
    Internet fraud, cybercrime
    Internet-of-Things security
    Intrusion detection
    Key management
    Malware
    Mobile/wireless/5G security
    Network security protocols
    Privacy/anonymity, PETs
    Security in e-commerce
    Security in grid systems
    Security in P2P systems
    Security/privacy metrics
    Trust management
    Ubiquitous security/privacy
    Usability in security/privacy
Last updated by Dou Sun in 2017-11-24
Related Publications
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20151573321%
20141473322.4%
20131503523.3%
20121923317.2%
20111723118%
20101783218%
20091503221.3%
20081313022.9%
20072603111.9%
20062183315.1%
20051583522.2%
20042973612.1%
20031913216.8%
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ADCSAustralasian Document Computing Symposium2014-09-292014-10-132014-11-27
aDBSecIFIP WG 11.3 Conference on Data and Applications Security and Privacy2017-03-162017-04-262017-07-19
ICCS'''IEEE International Conference on Circuits Systems2017-10-312017-11-102017-12-20
ccb1MMMInternational Conference on MultiMedia Modeling2017-09-152017-11-032018-02-05
ICMICInternational Conference on Mobile IT Convergence2013-05-152013-05-302013-07-03
cTAPIARichard Tapia Celebration of Diversity in Computing Conference  2016-09-14
PRDCIEEE Pacific Rim International Symposium on Dependable Computing2016-07-152016-09-102017-01-22
CyberSafetyInternational Workshop on Computational Methods for CyberSafety2016-08-252016-09-102016-10-28
baa1ACSACAnnual Computer Security Applications Conference 2017-06-082017-08-182017-12-04
DMBDInternational Conference on Data Mining and Big Data2018-01-302018-03-262018-06-17
Recommendation