CALL FOR PAPERS——10th International Conference on Information Security and Cryptology
发布日期:
2014-09-02
浏览次数:
761

2nd CALL FOR PAPERS

10th International Conference on Information Security and Cryptology
Inscrypt 2014
(In Cooperation With IACR)
December 13 - 15, 2014, Beijing, China
http://www.inscrypt.cn/
*************************************************************************
The submission deadline has been extended to September 14, 2014
*************************************************************************
 
The 10th China International Conference on Information Security and 
Cryptology (Inscrypt 2014) will be held in Beijing, from December 13 
to 15, 2014, co-organized by the State Key Laboratory of Information Security, 
the Chinese Association for Cryptologic Research of China, and In Cooperation 
with IACR. It is an annual conference targeting the top research results in the 
related area. Topics of interest encompass research advances in ALL areas of 
information security, cryptology, and their applications. Inscrypt 2014 seeks 
high-quality research contributions in the form of well developed papers. 
The conference proceedings will be published by Springer-Verlag in LNCS series.
 
Papers
======
Authors are invited to submit full papers presenting new research 
results related to cryptology, information security and their applications. 
All submissions must describe original research that is not published or 
currently under review by another conference or journal. Areas of interest 
include, but are not limited to:
 
Access Control
Authentication and Authorization
Biometric Security 
Distributed System Security 
Big Data and Cloud Security 
Electronic Commerce Security 
Intrusion Detection 
Information Hiding and Watermarking 
Key Management and Key Recovery 
Network Security 
Security Protocols and Their Analysis 
Security Modeling and Architectures Provable Security 
Secure Multiparty Computation
Foundations of Cryptography
Secret Key and Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
 
Instruction for Authors
=======================
Conference language is English. All submissions must be anonymous, 
with no author names, affiliations, acknowledgments, or obvious 
references. It should begin with a title, a short abstract, and a 
list of key words, and its introduction should summarize the 
contributions of the paper at a level appropriate for a non-specialist 
reader. The paper should be intelligible and self-contained within 20 
pages including references and appendices and must be submitted 
electronically to http://www.easychair.org/conferences/?conf=inscrypt2014. 
Submissions not meeting these guidelines risk rejection without consideration 
of their merits. It is highly advised to prepare the submissions in the 
Springer LNCS format. More information can be found at conference web site 
http://www.inscrypt.cn/.
 
Important Dates
===============
Deadline for Submission(extended to):               September 14, 2014
Notification of Acceptance:                       November 7, 2014
Pre-proceedings version deadline:               November 15, 2014
Proceedings version deadline:                       December 31, 2014
 
General Chair
=============
Xiaoyun Wang, Tsinghua University, China
 
Program co-Chairs
=================
Dongdai Lin, SKLOIS, Institute of Information Engineering, CAS, China
Moti Yung, Google Inc. & Columbia University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore
 
Organization co-Chairs
======================
Yanping Yu, Chinese Association for Cryptologic Research, China
Chuankun Wu, SKLOIS, Institute of Information Engineering, CAS, China
Yongbin Zhou, SKLOIS, Institute of Information Engineering, CAS, China
 
Publicity Chair
===============
Chen Yu, SKLOIS, Institute of Information Engineering, CAS, China
 
Technical Program Committee
===========================
Cristina Alcaraz University of Malaga, Spain
Basel Alomair King Abdulaziz City for Science and Technology & University of Washington,USA
Man Ho Au University of Wollongong,Australia
Elisa Bertino Purdue University,USA
Ioana Boureanu EPFL, Lausanne, Switzerland
Zhenfu Cao Shanghai Jiao Tong University, China
Bogdan Carbunar Florida International University, USA
Yu Chen Institute of Information Engineering, CAS, China
Kefei Chen Hangzhou Normal University, China
Liqun Chen Hewlett-Packard Laboratories, UK
Songqing Chen George Mason University,USA
Cunsheng Ding Hong Kong University of Science and Technology, China
Jintai Ding University of Cincinnati, USA
Xuhua Ding Singapore Management University, Singapore
 
Shlomi Dolev Ben-Gurion  University of the Negev, Israel
Chun-I Fan National Sun Yat-sen University, Taiwan
Sara Foresti DI - Universita` degli Studi di Milano, Italy
Dieter Gollmann Hamburg University of Technology, Germany
Stefanos Gritzalis University of the Aegean, Greece
Huaqun Guo Institute for Infocomm Research, Singapore
Jinguang Han Nanjing University of Finance and Economics, China
Feng Hao Newcastle University, UK
Matt Henricksen Institute For Infocomm Research, Singapore
Xinyi Huang Fujian Normal University, China
Matthias Krause University of Mannheim, Germany
Xuejia Lai Shanghai Jiaotong University, China
Costas Lambrinoudakis University of Piraeus, Greece
Jiguo Li Hohai University,China
Chao Li National Defense University of Science and Technology, China
Hui Li Xidian University, China
Peng Liu The Pennsylvania State University, USA
Xiapu Luo The Hong Kong Polytechnic University
Subhamoy Maitra Indian Statistical Institute, India
Florian Mendel Graz University of Technology, Austria
Chris Mitchell Royal Holloway, University of London, UK
Atsuko Miyaji Japan Advanced Institute of Science and Technology, Japan
Yi Mu University of Wollongong, Australia
Claudio Orlandi Aarhus University, Denmark
Xinming Ou Kansas State University, USA
Giuseppe Persiano Università di Salerno, Italy
Bertram Poettering Royal Holloway, University of London, UK
Radha Poovendran University of Washington, USA
Giovanni Russello The University of Auckland, New Zealand
Kouichi Sakurai Kyushu University,Japan
Willy Susilo University of Wollongong, Australia
Tsuyoshi Takagi Kyushu University, Japan
Wen-Guey Tzeng National Chiao Tung University, Taiwan
Yevgeniy Vahlis University of Toronto, Canada
Wenling Wu Institute of Software, CAS, China
Yang Xiang Deakin University, Australia
Shouhuai Xu University of Texas at San Antonio, USA
Jia Xu Institute for Infocomm Research, Singapore
Danfeng Yao Virginia Tech, USA
Mingwu Zhang Hubei University of Technology, China
Rui Zhang Chinese Academy of Sciences, China
Fangguo Zhang Sun Yat-sen University, China
Futai Zhang Nanjing Normal University, China
Yuliang Zheng UNC Charlotte, USA
Hong-Sheng Zhou Virginia Commonwealth University, USA
Cliff Zou University of Central Florida, USA
 
Conference email
================
Inscrypt2014@easychair.org