文章来源: | 发布时间:2015-07-20 | 【字号: 小 中 大 】 |
CALL FOR PAPERS
11th International Conference on Information Security and Cryptology
Inscrypt 2015
November 1 - 3, 2015, Beijing, China
http://www.inscrypt.cn/
--- In Cooperation with IACR ---
The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015) will be held in Beijing, from November 1 to 3, 2015, co-organized by the State Key Laboratory of Information Security, the Chinese Association for Cryptologic Research of China, and In Cooperation with IACR. It is an annual conference targeting the top research results in the related area. Topics of interest encompass research advances in ALL areas of information security, cryptology, and their applications. Inscrypt 2015 seeks high-quality research contributions in the form of well-developed papers, and two successive tracks for crypto and security respectively will be organized. The conference proceedings will be published by Springer-Verlag in LNCS series.
Papers
======
Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications for either crypto track or security track. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:
Crypto Track:
-------------
Foundations of Cryptography
Provable Security
Sequences and Boolean Functions
Secure Multiparty Computation
Symmetric Key Cryptosystems
Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Key Management and Key Recovery
Security Protocols and Their Analysis
Information Hiding and Watermarking
Secure Computation Outsourcing
Functional Computation and Verifiable Computation
Obfuscation
Leakage Resilient Cryptography
Security Track:
---------------
Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Electronic Commerce Security
Intrusion Detection
Network Security
Security Modeling and Architectures
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
Privacy Enhancing Technologies
Genomic Privacy and SDN Security
Big Data and Cloud Security
Instruction for Authors
=======================
Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to http://www.easychair.org/conferences/?conf=inscrypt2015 . Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format. More information can be found at conference web site http://www.inscrypt.cn/.
Important Dates
===============
Deadline for Submission: August 10, 2015
Notification of Acceptance: October 8, 2015
Pre-proceedings version deadline: October 15, 2015
Proceedings version deadline: December 3, 2015
Conference Chair:
=================
Dan Meng, Institute of Information Engineering, CAS, China
Jianying Zhou,Institute for Infocomm Research, Singapore
Program Co-Chairs:
==================
Dongdai Lin, Institute of Information Engineering, CAS, China
Xiaofeng Wang,Indiana University at Bloomington, USA
Moti Yung, Google Inc. & Columbia University, USA
Local Orgranizing committee Co-Chairs:
=====================================
Chuankun Wu,Institute of Information Engineering, CAS, China
Yanping Yu, Chinese Association for Cryptologic Research, China
Publicity Chair
===============
Kai Chen, SKLOIS, Institute of Information Engineering, CAS, China
Technical Program Committee
===========================
Erman Ayday Bilkent University, Turkey
Elisa Bertino Purdue University, USA
Ioana Boureanu Akamai Technologies Limited, UK
Kai Chen Institute of Information Engineering, CAS, China
Kefei Chen Hangzhou Normal University, China
Liqun Chen Hewlett-Packard Laboratories, UK
Xiaofeng Chen Xidian University, China
Sherman S. M. Chow Chinese University of Hong Kong, China
Nicolas Courtois University College London, UK
Laszlo Csirmaz Central European University, Hungary
Jintai Ding University of Cincinnati, USA
Cunsheng Ding Hong Kong University of Science and Technology, China
Yingfei Dong University of Hawaii, USA
Chun-I Fan National Sun Yat-sen University, Taiwan
Debin Gao Singapore Management University, Singapore
Dawu Gu Shanghai Jiao Tong University, China
Huaqun Guo Institute for Infocomm Research, Singapore
Jian Guo Nanyang Technological University, Singapore
Weili Han Fudan University, China
Feng Hao Newcastle University, UK
Tor Helleseth University of Bergen, Norway
Matt Henricksen Institute For Infocomm Research, Singapore
Lei Hu Institute of Information Engineering, CAS, China
Xinyi Huang Fujian Normal University, China
Mehmet Sabir Kiraz TUBITAK BILGEM, Turkey
Ninghui Li Purdue University, USA
Yingjiu Li Singapore Management University, Singapore
Tieyan Li Huawei, Singapore
Xin Li John Hopkins University, USA
Peng Liu The Pennsylvania State University, USA
Yang Liu Nanyang Technological University, Singapore
Di Ma University of Michigan-Dearborn, USA
Subhamoy Maitra Indian Statistical Institute, India
Florian Mendel Graz University of Technology, Austria
Atsuko Miyaji Japan Advanced Institute of Science and Technology, Japan
Maria Naya-Plasencia Inria, France
Giuseppe Persiano Universita di Salerno, Italy
Thomas Peters Ecole Normale Superieure, France
Josef Pieprzyk Queensland University of Technology, Australia
Bertram Poettering Ruhr University Bochum, Germany
Zhiyun Qian University of California, Riverside, USA
Longjiang Qu National University of Defense Technology, China
Giovanni Russello The University of Auckland, New Zealand
Seungwon Shin KAIST, Korea
Willy Susilo University of Wollongong, Australia
Shaohua Tang South China University of Technology, China
Vijay Varadharajan Macquarie University, Australia
Cong Wang City University of Hong Kong, China
Meiqin Wang Shandong University, China
Jian Weng Jinan University, China
Wenling Wu Institute of Software, CAS, China
Shouhuai Xu University of Texas at San Antonio, USA
Wenyuan Xu Zhejiang University, China
Danfeng Yao Virginia Tech, USA
Ting Yu Qatar Computing Research Institute, Qatar
Yu Yu Shanghai Jiao Tong University, China
Kehuan Zhang Chinese University of Hong Kong, China
Fangguo Zhang Sun Yat-sen University, China
Yuliang Zheng University of Alabama at Birmingham, USA
Vassilis Zikas ETH Zurich
Cliff Zou University of Central Florida, USA
Conference email
================
附件: |
©中国科学院信息工程研究所信息安全国家重点实验室 备案序号:京ICP备12047326-1号 电话:010-82546611 传真:010-82546564 地址:北京市海淀区闵庄路甲89号 100093 |