Conference Information
FC 2020: International Conference on Financial Cryptography and Data Security
http://fc20.ifca.ai/
Submission Date:
2019-09-17
Notification Date:
2019-11-15
Conference Date:
2020-02-10
Location:
Kota Kinabalu, Sabah, Malaysia
Years:
24
CCF: c   CORE: b   QUALIS: b1   Viewed: 10285   Tracked: 39   Attend: 5

Conference Location
Advertisment
Call For Papers
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate on information security with a specific focus on financial and commercial systems. Original works on all aspects of financial security and privacy are solicited, from fundamental theory to real-world deployments. Submissions need not be exclusively concerned with cryptography. Systems security, economic or behavioral perspectives, and interdisciplinary efforts are particularly encouraged.

Financial Cryptography and Data Security has two submission tracks, a blockchain track that serves as the premier venue for cryptocurrency and blockchain research (subsuming the prior BITCOIN workshop), and a traditional track focusing on security and cryptography in all other financial and payment systems.

Topics of particular interest for the traditional track include all aspects of (non-blockchain) payment and financial systems, in particular:

    Access Control
    Anonymity and Privacy
    Applied Cryptography
    Auctions and Incentive Design
    Authentication, Identification, and Biometrics
    Banking and Financial Services Security
    Behavioral Aspects of Security and Privacy
    Certification and Audits
    Cloud Computing and Data Outsourcing Security
    Contactless Payment and Ticketing Systems
    Digital Rights Management
    Economics of Security and Privacy
    Electronic Commerce Security
    Electronic Crime and Underground Markets
    Fraud Detection and Management
    Game Theory for Security and Privacy
    Legal and Regulatory Issues
    Phishing and Social Engineering
    Reputation Systems
    Smart Contracts and Financial Instruments
    Smartcards, Secure Tokens, and Secure Hardware
    Trust Management
    Trusted Execution Environments (TEE) Security and Applications
    Usability and Security
    Voting Systems
    Web Security

Topics of particular interest for the blockchain track include, but are not limited to:

    Applications Using or Built on Top of Bitcoin
    The Bitcoin Protocol and Extensions
    Blockchain Applications
    Case Studies (e.g., of adoption, attacks, forks, scams, …)
    Cryptocurrency Adoption and Transition Dynamics
    Digital Cash and Payment Systems
    Distributed Consensus Protocols
    Distributed Ledgers
    Economic and Monetary Aspects of Cryptocurrencies
    Economics and/or Game Theoretic Analysis of Cryptocurrency Protocols
    Forensics and Monitoring
    Fraud Detection and Financial Crime Prevention
    Legal, Ethical and Societal Aspects of (Decentralized) Virtual Currencies
    Peer-to-Peer Networks
    Permissioned and Permissionless Blockchains
    Proof-of-work, -stake, -burn
    Real-world Measurements and Metrics
    Regulation and Law Enforcement
    Relation of Cryptocurrencies to Other Payment Systems
    Smart Contract Analysis and Tools
    Transaction Graph Analysis
    Usability and User Studies

Papers from both tracks may be reviewed by the same program committee and will be presented from Monday to Thursday of the conference week, without parallel sessions to the extent possible. The workshops, as in previous years, will be held in parallel to each other on Friday.
Last updated by Dou Sun in 2019-09-01
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20141383122.5%
20131253124.8%
2012882933%
2011652640%
20101303426.2%
2009912123.1%
2008862630.2%
2007851720%
2006642539.1%
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ba2CODES+ISSSInternational Conference on Hardware/Software Codesign and System Synthesis2019-04-052019-07-102019-10-13
iCEERPInternational Conference on Electrical Engineering Research and Practice2019-09-232019-09-302019-11-24
ADCSAustralasian Document Computing Symposium2014-09-292014-10-132014-11-27
ANALCOMeeting on Analytic Algorithmics and Combinatorics2018-07-26 2019-01-06
aBuildSysACM International Conference on Systems for Energy-Efficient Built Environments2018-06-152018-08-202018-11-07
RSSRailInternational Conference Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification 2017-06-012017-07-082017-11-14
SPNGNInternational Symposium on Security and Privacy in Next-Generation Networks 2014-11-172014-12-192015-04-13
ICSPSInternational Conference on Signal Processing Systems2019-09-202019-10-052019-11-15
CSCS'ACM Computer Science in Cars Symposium2018-07-162018-07-312018-09-13
baa1ACSACAnnual Computer Security Applications Conference 2019-06-152019-08-232019-12-09
Related Journals
CCFFull NameImpact FactorPublisherISSN
Constraints1.748Springer1383-7133
Journal of Control Theory and Applications Springer1672-6340
bDesigns, Codes and Cryptography0.958Springer0925-1022
cIET Information Security0.862IET1751-8709
Journal of Internet Security DDSecure.Net Inc.1206-4890
bJournal of Functional Programming1.37Cambridge University Press0956-7968
Computational Science and Engineering SoftwareRational Publication0000-0000
bIEEE Transactions on Automation Science and Engineering3.667IEEE1545-5955
cInformation Management & Computer Security Emerald0968-5227
bJournal of Computer Security IOS Press0926-227X
Recommendation