Conference Information
FC 2020: International Conference on Financial Cryptography and Data Security
Submission Date:
Notification Date:
Conference Date:
Kota Kinabalu, Sabah, Malaysia
CCF: c   CORE: b   QUALIS: b1   Viewed: 12683   Tracked: 44   Attend: 5

Conference Location
Call For Papers
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate on information security with a specific focus on financial and commercial systems. Original works on all aspects of financial security and privacy are solicited, from fundamental theory to real-world deployments. Submissions need not be exclusively concerned with cryptography. Systems security, economic or behavioral perspectives, and interdisciplinary efforts are particularly encouraged.

Financial Cryptography and Data Security has two submission tracks, a blockchain track that serves as the premier venue for cryptocurrency and blockchain research (subsuming the prior BITCOIN workshop), and a traditional track focusing on security and cryptography in all other financial and payment systems.

Topics of particular interest for the traditional track include all aspects of (non-blockchain) payment and financial systems, in particular:

    Access Control
    Anonymity and Privacy
    Applied Cryptography
    Auctions and Incentive Design
    Authentication, Identification, and Biometrics
    Banking and Financial Services Security
    Behavioral Aspects of Security and Privacy
    Certification and Audits
    Cloud Computing and Data Outsourcing Security
    Contactless Payment and Ticketing Systems
    Digital Rights Management
    Economics of Security and Privacy
    Electronic Commerce Security
    Electronic Crime and Underground Markets
    Fraud Detection and Management
    Game Theory for Security and Privacy
    Legal and Regulatory Issues
    Phishing and Social Engineering
    Reputation Systems
    Smart Contracts and Financial Instruments
    Smartcards, Secure Tokens, and Secure Hardware
    Trust Management
    Trusted Execution Environments (TEE) Security and Applications
    Usability and Security
    Voting Systems
    Web Security

Topics of particular interest for the blockchain track include, but are not limited to:

    Applications Using or Built on Top of Bitcoin
    The Bitcoin Protocol and Extensions
    Blockchain Applications
    Case Studies (e.g., of adoption, attacks, forks, scams, …)
    Cryptocurrency Adoption and Transition Dynamics
    Digital Cash and Payment Systems
    Distributed Consensus Protocols
    Distributed Ledgers
    Economic and Monetary Aspects of Cryptocurrencies
    Economics and/or Game Theoretic Analysis of Cryptocurrency Protocols
    Forensics and Monitoring
    Fraud Detection and Financial Crime Prevention
    Legal, Ethical and Societal Aspects of (Decentralized) Virtual Currencies
    Peer-to-Peer Networks
    Permissioned and Permissionless Blockchains
    Proof-of-work, -stake, -burn
    Real-world Measurements and Metrics
    Regulation and Law Enforcement
    Relation of Cryptocurrencies to Other Payment Systems
    Smart Contract Analysis and Tools
    Transaction Graph Analysis
    Usability and User Studies

Papers from both tracks may be reviewed by the same program committee and will be presented from Monday to Thursday of the conference week, without parallel sessions to the extent possible. The workshops, as in previous years, will be held in parallel to each other on Friday.
Last updated by Dou Sun in 2019-09-01
Acceptance Ratio
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
DaMiInternational Conference on Data Mining2020-05-302020-06-062020-06-13
IConDAInternational Conference on Computer & Drone Applications2019-11-15 2019-12-19
ba2CODES+ISSSInternational Conference on Hardware/Software Codesign and System Synthesis2020-04-032020-07-062020-10-11
ICANInternational Conference on Computing, Analytics and Networks2019-10-052019-11-152020-02-07
b2HCIIInternational Conference on Human-Computer Interaction2015-11-062015-12-042016-07-17
FCST'IEEE International Symposium on Future Cyber Security Technologies2018-08-072018-08-252018-10-15
ICDCITInternational Conference on Distributed Computing and Internet Technology2015-08-092015-09-292016-01-15
mLearnWorld Conference on Mobile and Contextual Learning2017-07-202017-08-282017-10-30
cb3CISInternational Conference on Computational Intelligence and Security2020-08-052020-08-312020-11-27
ICETISInternational Conference on Electronic Technology and Information Science2018-06-04 2018-06-08
Related Journals
CCFFull NameImpact FactorPublisherISSN
Journal of Cryptographic Engineering Springer2190-8508
bDesigns, Codes and Cryptography0.958Springer0925-1022
cIET Information Security0.862IET1751-8709
International Journal of Information Security1.822Springer1615-5262
Journal of Internet Security DDSecure.Net Inc.1206-4890
bJournal of Functional Programming1.37Cambridge University Press0956-7968
Journal of Mathematical CryptologyWalter de Gruyter1862-2976
International Journal of Distributed Systems and TechnologiesIGI Global Publishing1947-3532
Random Structures & Algorithms1.008Wiley-Blackwell1042-9832
Full NameImpact FactorPublisher
Journal of Cryptographic Engineering Springer
Designs, Codes and Cryptography0.958Springer
IET Information Security0.862IET
International Journal of Information Security1.822Springer
Journal of Internet Security DDSecure.Net Inc.
Journal of Functional Programming1.37Cambridge University Press
Journal of Mathematical CryptologyWalter de Gruyter
International Journal of Distributed Systems and TechnologiesIGI Global Publishing
Random Structures & Algorithms1.008Wiley-Blackwell