-
-
[分享]ACNS'10: Call for papers
-
发表于: 2009-12-23 23:03 5910
-
From: Mailing list for the scientific community interested in computer
security [mailto:SECURITY@FOSAD.ORG] On Behalf Of Cas Cremers
Sent: 07 December 2009 22:06
To: SECURITY@FOSAD.ORG
Subject: ACNS'10: Call for papers
CALL FOR PAPERS
8th International Conference on
Applied Cryptography and Network Security (ACNS '10)
June 22-25, 2010, Beijing, China
www.tcgchina.org/acns2010/
Submissions due Feb. 5, 2010 (FIRM)
Notification by Mar. 31, 2010
Camera-ready due Apr. 20, 2010
Original papers on all aspects of applied cryptography and network
security are solicited for submission to ACNS '10. Topics of relevance
include but are not limited to:
- Applied cryptography and provably-secure cryptographic protocols
Design and analysis of efficient cryptographic primitives: public-key
and symmetric-key cryptosystems, block ciphers, and hash functions
- Network security protocols
- Techniques for anonymity; trade-offs between anonymity and utility
- Integrating security into the next-generation Internet: DNS security,
routing, naming, denial-of-service attacks, TCP/IP, secure multicast
- Economic fraud on the Internet: phishing, pharming, spam, and click
fraud
- Email and web security
- Public key infrastructure, key management, certification, and
revocation
- Security and privacy for emerging technologies: sensor networks,
mobile (ad hoc) networks, peer-to-peer networks, bluetooth, 802.11,
RFID
- Trust metrics and robust trust inference in distributed systems
- Security and usability
- Intellectual property protection and digital rights management
- Modeling and protocol design for rational and malicious adversaries
- Automated analysis of protocols
Papers suggesting novel paradigms, original directions, or
non-traditional perspectives are especially welcome.
As in previous years, there will be an academic track and an industrial
track. Submissions to the academic track should emphasize research
contributions, while submissions to the industrial track may focus on
implementation and deployment of real-world systems. Please indicate in
the title for submissions to the industrial track. The academic track
will have proceedings published in Springer's LNCS and will be available
at the conference. The industrial track will only have presentations
without formal proceedings.
INSTRUCTIONS FOR AUTHORS: All submissions will be blind reviewed. The
paper must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references. It should begin with a title, a
short abstract, and a list of keywords. Submissions must not
substantially duplicate work that was published elsewhere, or work that
any of the authors has submitted in parallel to any other conference or
workshop that has proceedings.
The final proceedings version will be a paper of at most 18 pages in the
llncs style, which corresponds to around 7000 words of text. The
document submitted (excluding appendices) should correspond to what the
authors expect to be published if their paper is accepted without
modification. We therefore strongly recommend that authors check whether
their paper (without appendices) will fit within the above llncs space
constraints. Committee members are not required to review more than
that, so the paper should be intelligible and self- contained within
this length. Submissions not meeting these guidelines risk rejection
without consideration of their merits.
Authors will be asked to indicate whether their submissions should be
considered for the best student paper award; any paper co-authored by a
full-time student is eligible for this award.
Authors of accepted papers must guarantee that their paper will be
presented at the conference.
General Chair
Yongfei Han (BJUT & ONETS, China)
Program Chairs
Jianying Zhou (I2R, Singapore)
Moti Yung (Columbia University & Google, USA)
Publicity Chairs
Javier Lopez (University of Malaga, Spain)
Tsuyoshi Takagi (FUN, Japan)
Program Committee
Michel Abdalla (ENS, France)
Ben Adida (Harvard University, USA)
N. Asokan (Nokia, Finland)
Joonsang Baek (I2R, Singapore)
Lucas Ballard (Google, USA)
Feng Bao (I2R, Singapore)
Lujo Bauer (Carnegie Mellon University, USA)
Alex Biryukov (Uni. of Luxembourg, Luxembourg)
Alexandra Boldyreva (Georgia Tech, USA)
Colin Boyd (QUT, Australia)
Levente Buttyan (BME, Hungary)
Liqun Chen (HP Laboratories, UK)
Songqing Chen (George Mason University, USA)
Debra Cook (Telcordia, USA)
Cas Cremers (ETH Zurich, Switzerland)
Sabrina De Capitani di Vimercati (UNIMI, Italy)
Robert Deng (SMU, Singapore)
Orr Dunkelman (Weizmann Institute, Israel)
Dieter Gollmann (TU Hamburg-Harburg, Germany)
Stefanos Gritzalis (University of the Aegean, Greece)
Marc Joye (Thomson R&D, France)
Charanjit Jutla (IBM, USA)
Angelos Keromytis (Columbia University, USA)
Xuejia Lai (Shanghai Jiao Tong University, China)
Dong Hoon Lee (Korea University, Korea)
Ninghui Li (Purdue University, USA)
Yingjiu Li (SMU, Singapore)
Benoit Libert (UCL, Belgium)
Dongdai Lin (Institute of Software, China)
Peng Liu (Pennsylvania State University, USA)
Javier Lopez (University of Malaga, Spain)
Mark Manulis (TU Darmstadt, Germany)
Fabio Martinelli (CNR, Italy)
Atefeh Mashatan (EPFL, Switzerland)
Paolo Milani (Technical University of Vienna, Austria)
Chris Mitchell (RHUL, UK)
Atsuko Miyaji (JAIST, Japan)
Tatsuaki Okamoto (NTT, Japan)
Alina Oprea (RSA Laboratories, USA)
Elisabeth Oswald (University of Bristol, UK)
Benny Pinkas (University of Haifa, Israel)
Pandu Rangan (Indian Institute of Technology, India)
Vincent Rijmen (TU Graz, Austria)
Mark Ryan (University of Birmingham, UK)
Ahmad-Reza Sadeghi (Ruhr-Uni. Bochum, Germany)
Reihaneh Safavi-Naini (University of Calgary, Canada)
Palash Sarkar (Indian Statistical Institute, India)
Nitesh Saxena (Poly Institute of New York Uni., USA)
Radu Sion (Stony Brook University, USA)
Willy Susilo (University of Wollongong, Australia)
Tsuyoshi Takagi (FUN, Japan)
Duncan Wong (City University of Hong Kong, China)
security [mailto:SECURITY@FOSAD.ORG] On Behalf Of Cas Cremers
Sent: 07 December 2009 22:06
To: SECURITY@FOSAD.ORG
Subject: ACNS'10: Call for papers
CALL FOR PAPERS
8th International Conference on
Applied Cryptography and Network Security (ACNS '10)
June 22-25, 2010, Beijing, China
www.tcgchina.org/acns2010/
Submissions due Feb. 5, 2010 (FIRM)
Notification by Mar. 31, 2010
Camera-ready due Apr. 20, 2010
Original papers on all aspects of applied cryptography and network
security are solicited for submission to ACNS '10. Topics of relevance
include but are not limited to:
- Applied cryptography and provably-secure cryptographic protocols
Design and analysis of efficient cryptographic primitives: public-key
and symmetric-key cryptosystems, block ciphers, and hash functions
- Network security protocols
- Techniques for anonymity; trade-offs between anonymity and utility
- Integrating security into the next-generation Internet: DNS security,
routing, naming, denial-of-service attacks, TCP/IP, secure multicast
- Economic fraud on the Internet: phishing, pharming, spam, and click
fraud
- Email and web security
- Public key infrastructure, key management, certification, and
revocation
- Security and privacy for emerging technologies: sensor networks,
mobile (ad hoc) networks, peer-to-peer networks, bluetooth, 802.11,
RFID
- Trust metrics and robust trust inference in distributed systems
- Security and usability
- Intellectual property protection and digital rights management
- Modeling and protocol design for rational and malicious adversaries
- Automated analysis of protocols
Papers suggesting novel paradigms, original directions, or
non-traditional perspectives are especially welcome.
As in previous years, there will be an academic track and an industrial
track. Submissions to the academic track should emphasize research
contributions, while submissions to the industrial track may focus on
implementation and deployment of real-world systems. Please indicate in
the title for submissions to the industrial track. The academic track
will have proceedings published in Springer's LNCS and will be available
at the conference. The industrial track will only have presentations
without formal proceedings.
INSTRUCTIONS FOR AUTHORS: All submissions will be blind reviewed. The
paper must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references. It should begin with a title, a
short abstract, and a list of keywords. Submissions must not
substantially duplicate work that was published elsewhere, or work that
any of the authors has submitted in parallel to any other conference or
workshop that has proceedings.
The final proceedings version will be a paper of at most 18 pages in the
llncs style, which corresponds to around 7000 words of text. The
document submitted (excluding appendices) should correspond to what the
authors expect to be published if their paper is accepted without
modification. We therefore strongly recommend that authors check whether
their paper (without appendices) will fit within the above llncs space
constraints. Committee members are not required to review more than
that, so the paper should be intelligible and self- contained within
this length. Submissions not meeting these guidelines risk rejection
without consideration of their merits.
Authors will be asked to indicate whether their submissions should be
considered for the best student paper award; any paper co-authored by a
full-time student is eligible for this award.
Authors of accepted papers must guarantee that their paper will be
presented at the conference.
General Chair
Yongfei Han (BJUT & ONETS, China)
Program Chairs
Jianying Zhou (I2R, Singapore)
Moti Yung (Columbia University & Google, USA)
Publicity Chairs
Javier Lopez (University of Malaga, Spain)
Tsuyoshi Takagi (FUN, Japan)
Program Committee
Michel Abdalla (ENS, France)
Ben Adida (Harvard University, USA)
N. Asokan (Nokia, Finland)
Joonsang Baek (I2R, Singapore)
Lucas Ballard (Google, USA)
Feng Bao (I2R, Singapore)
Lujo Bauer (Carnegie Mellon University, USA)
Alex Biryukov (Uni. of Luxembourg, Luxembourg)
Alexandra Boldyreva (Georgia Tech, USA)
Colin Boyd (QUT, Australia)
Levente Buttyan (BME, Hungary)
Liqun Chen (HP Laboratories, UK)
Songqing Chen (George Mason University, USA)
Debra Cook (Telcordia, USA)
Cas Cremers (ETH Zurich, Switzerland)
Sabrina De Capitani di Vimercati (UNIMI, Italy)
Robert Deng (SMU, Singapore)
Orr Dunkelman (Weizmann Institute, Israel)
Dieter Gollmann (TU Hamburg-Harburg, Germany)
Stefanos Gritzalis (University of the Aegean, Greece)
Marc Joye (Thomson R&D, France)
Charanjit Jutla (IBM, USA)
Angelos Keromytis (Columbia University, USA)
Xuejia Lai (Shanghai Jiao Tong University, China)
Dong Hoon Lee (Korea University, Korea)
Ninghui Li (Purdue University, USA)
Yingjiu Li (SMU, Singapore)
Benoit Libert (UCL, Belgium)
Dongdai Lin (Institute of Software, China)
Peng Liu (Pennsylvania State University, USA)
Javier Lopez (University of Malaga, Spain)
Mark Manulis (TU Darmstadt, Germany)
Fabio Martinelli (CNR, Italy)
Atefeh Mashatan (EPFL, Switzerland)
Paolo Milani (Technical University of Vienna, Austria)
Chris Mitchell (RHUL, UK)
Atsuko Miyaji (JAIST, Japan)
Tatsuaki Okamoto (NTT, Japan)
Alina Oprea (RSA Laboratories, USA)
Elisabeth Oswald (University of Bristol, UK)
Benny Pinkas (University of Haifa, Israel)
Pandu Rangan (Indian Institute of Technology, India)
Vincent Rijmen (TU Graz, Austria)
Mark Ryan (University of Birmingham, UK)
Ahmad-Reza Sadeghi (Ruhr-Uni. Bochum, Germany)
Reihaneh Safavi-Naini (University of Calgary, Canada)
Palash Sarkar (Indian Statistical Institute, India)
Nitesh Saxena (Poly Institute of New York Uni., USA)
Radu Sion (Stony Brook University, USA)
Willy Susilo (University of Wollongong, Australia)
Tsuyoshi Takagi (FUN, Japan)
Duncan Wong (City University of Hong Kong, China)
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!
赞赏
他的文章
- [转帖][Cado-nfs-discuss] 795-bit factoring and discrete logarithms (RSA-240 于2019年12月2日被破解) 19498
- [转帖]How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits 8162
- [推荐]RSA-220 has 220 decimal digits (729 bits), and was factored 6895
- [推荐]RSA-210 has been factored. 11179
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks... 8923
谁下载
看原图
赞赏
雪币:
留言: