Conference Information
ACNS 2017 : International Conference on Applied Cryptography and Network Security
https://cy2sec.comm.eng.osaka-u.ac.jp/acns2017/
Submission Date:
2017-02-03
Notification Date:
2017-04-07
Conference Date:
2017-07-10
Location:
Kanazawa, Japan
Years:
15
CCF: c   CORE: b   QUALIS: b1   Viewed: 9884   Tracked: 27   Attend: 3

Conference Location
Advertisment
Call For Papers
The 15th International Conference on Applied Cryptography and Network Security (ACNS2017) will be held in Kanazawa, Japan on July 2017. It will be organized by Japan Advanced Institute of Science and Technology (JAIST) and Osaka University.

ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. Both academic research works with high relevance to real-world problems as well as developments in industrial and technical frontiers fall within the scope of the conference.

The previous ACNS conference series were successfully held in Kunming, China (2003), Yellow Mountain, China (2004), New York, USA (2005), Singapore (2006), Zhuhai, China (2007), New York, USA (2008), Paris, France (2009), Beijing, China (2010), Malaga, Spain (2011), Singapore (2012), Banff, Canada (2013), Lausanne, Switzerland (2014), New York, USA (2015) and London, UK (2016). The conference proceedings are published in LNCS series.

Conference Topics

Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (including performance measurements, usability studies) of algorithms / protocols / standards / implementations / technologies / devices / systems, standing in close relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include, but are not limited to:

Access control 	Future Internet security 	Pervasive security
Applied cryptography 	Identity management 	Security in e-commerce
Automated security analysis 	IP protection 	Security in P2P systems
Complex systems security 	Internet fraud, cybercrime 	Security in grid systems
Critical infrastructures 	Internet-of-Things security 	Cloud security/privacy
Cryptographic primitives 	Intrusion detection 	Security/privacy metrics
Cryptographic protocols 	Key management 	Trust management
Data protection 	Malware 	Ubiquitous security/privacy
Database/system security 	Mobile/wireless/5G security 	Human factors in security
Digital rights management 	Network security protocols 	Usability in security/privacy
Email and web security 	Privacy/anonymity, PETs 	

Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility will be clarified with authors of accepted papers following the notification). Papers should be submitted electronically through EasyChair. 
Last updated by Dou Sun in 2016-11-23
Related Publications
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20151573321%
20141473322.4%
20131503523.3%
20121923317.2%
20111723118%
20101783218%
20091503221.3%
20081313022.9%
20072603111.9%
20062183315.1%
20051583522.2%
20042973612.1%
20031913216.8%
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ADCSAustralasian Document Computing Symposium2014-09-292014-10-132014-11-27
DBSecInternational Conference on Data and Applications Security and Privacy2015-03-072015-04-202015-07-13
ccb1MMMInternational Conference on MultiMedia Modeling2016-08-312016-10-222017-01-04
ICMICInternational Conference on Mobile IT Convergence2013-05-152013-05-302013-07-03
cTAPIARichard Tapia Celebration of Diversity in Computing Conference  2016-09-14
PRDCIEEE Pacific Rim International Symposium on Dependable Computing2016-07-152016-09-102017-01-22
CyberSafetyInternational Workshop on Computational Methods for CyberSafety2016-08-252016-09-102016-10-28
baa1ACSACAnnual Computer Security Applications Conference 2016-06-012016-08-152016-12-05
DMBDInternational Conference on Data Mining and Big Data2017-02-202017-03-312017-07-27
CISIMInternational Conference on Computer Information Systems and Industrial Management Applications2016-04-282016-06-142016-09-14
Recommendation