Conference Information
ProvSec 2021: International Conference on Provable and Practical Security
http://provsec2021.scau.edu.cn/index/Submission Date: |
2021-07-10 |
Notification Date: |
2021-08-25 |
Conference Date: |
2021-11-05 |
Location: |
Guangzhou, China |
Years: |
15 |
Viewed: 10853 Tracked: 2 Attend: 0
Call For Papers
Authors are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to: * Provable security for asymmetric cryptography * Provable security for symmetric cryptography * Provable security for physical attacks * Privacy and anonymity technologies * Secure cryptographic protocols and applications * Security notions, approaches, and paradigms * Leakage-resilient cryptography * Lattice-based cryptography and post-quantum cryptography * Steganography and steganalysis * Blockchain and cryptocurrency * IoT security * Cloud security * Access control * Privacy-enhancing technologies * Database security * Big data security and privacy * Biometric security * Network security * Formal methods for security * Embedded systems security * Lightweight security * Cyber-physical security Instructions for Authors Submissions must be at most 16 pages excluding the bibliography, well-marked appendices, and supplementary material, and using the Springer LNCS format. Details on the Springer LNCS format can be obtained here. Authors should not change the font or the margins of the LNCS format. There is no page limit on the appendices and supplementary material. Note that reviewers are not required to read the appendices or any supplementary material. It is strongly encouraged that submissions are processed in LaTeX. All submissions must have page numbers. All submissions must have page numbers.All submissions will be blind-refereed and thus must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Submissions must be submitted electronically in PDF format. Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or any other conference/workshop that has proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Last updated by Dou Sun in 2021-06-19
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
ISMM | International Symposium on Memory Management | 2023-03-03 | 2023-06-18 |
OPODIS | International Conference on Principles of Distributed Systems | 2022-08-26 | 2022-12-13 |
ICEC' | International Conference on Electronic Commerce | 2013-03-16 | 2013-08-13 |
ICCSAIT | International Conference on Computer Science and Information Technologies | 2014-03-16 | 2014-08-22 |
MCIS | Mediterranean Conference on Information Systems | 2012-03-09 | 2012-09-08 |
ICT4AWE | International Conference on Information and Communication Technologies for Ageing Well and e-Health | 2015-12-07 | 2016-04-21 |
ICDES | International Conference on Design Engineering and Science | 2022-04-15 | 2022-05-13 |
IFIPTM | IFIP WG 11.11 International Conference on Trust Management | 2019-04-09 | 2019-07-17 |
ARES | International Conference on Availability, Reliability and Security | 2020-04-15 | 2020-08-24 |
mLearn | World Conference on Mobile and Contextual Learning | 2017-07-20 | 2017-10-30 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
c | IET Information Security | 0.862 | IET | 1751-8709 |
International Journal of Information Security | 1.988 | Springer | 1615-5262 | |
Journal of Internet Security | DDSecure.Net Inc. | 1206-4890 | ||
Computer Fraud & Security | Elsevier | 1361-3723 | ||
c | EURASIP Journal on Information Security | Springer | 1687-417X | |
International Journal on Cryptography and Information Security | AIRCC | 1839-8626 | ||
a | IEEE Transactions on Information Forensics and Security | 6.211 | IEEE | 1556-6013 |
b | ACM Transactions of Information and System Security | ACM | 1094-9224 | |
b | Software: Practice and Experience | 3.200 | John Wiley & Sons, Ltd | 1097-024X |
Journal of Mathematical Cryptology | Walter de Gruyter | 1862-2976 |
Full Name | Impact Factor | Publisher |
---|---|---|
IET Information Security | 0.862 | IET |
International Journal of Information Security | 1.988 | Springer |
Journal of Internet Security | DDSecure.Net Inc. | |
Computer Fraud & Security | Elsevier | |
EURASIP Journal on Information Security | Springer | |
International Journal on Cryptography and Information Security | AIRCC | |
IEEE Transactions on Information Forensics and Security | 6.211 | IEEE |
ACM Transactions of Information and System Security | ACM | |
Software: Practice and Experience | 3.200 | John Wiley & Sons, Ltd |
Journal of Mathematical Cryptology | Walter de Gruyter |
Recommendation