International Conference on Applied Cryptography and Network Security
摘要截稿:
全文截稿: 2018-01-26
开会时间: 2018-07-02
会议难度:
CCF分类: C类
会议地点: Leuven, Belgium
Overview
The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. The conference will be organised by the Computer Security and Industrial Cryptography (COSIC) group at KU Leuven. The proceedings of ACNS 2018 will be published by Springer.
ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers.
The conference seeks submissions presenting novel research on all technical aspects of applied cryptography, cyber security (including network and computer security) and privacy. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art.
Topics of interest include but are not limited to:
-Access control
-Applied cryptography
-Automated security analysis
-Biometric security/privacy
-Block chain and cryptocurrencies
-Cloud security/privacy
-Complex systems security
-Critical infrastructure
-Cryptographic primitives
-Cryptographic protocols
-Data protection
-Database/system security
-Digital rights management
-Email, app and web security
-Future Internet security
-Human factors in security
-Identity management
-IP protection
-Internet fraud, cybercrime
-Internet-of-Things security
-Intrusion detection
-Key management
-Malware
-Mobile/wireless/5G security
-Network security protocols
-Privacy/anonymity, PETs
-Security in e-commerce
-Security in grid systems
-Security in P2P systems
-Security/privacy metrics
-Trust management
-Ubiquitous security/privacy
-Usability in security/privacy