ACNS 2021: 19th International Conference on Applied Cryptography and Network Security Kamakura, Japan, June 21-24, 2021 |
Submission link | https://easychair.org/conferences/?conf=acns2021 |
Abstract registration deadline | September 7, 2020 |
Submission deadline | September 7, 2020 |
Contact:
For any questions regarding the submission or the conference, please write to acns2021-contact@googlegroups.com
Important Dates:
- First Submission Deadline 7 Sept 2020 AoE (Anytime on Earth)
- First Submission Notification 9 Nov 2020
- Second Submission Deadline 15 Jan 2021 AoE (Anytime on Earth)
- Second Submission Notification 22 Mar 2021
- Conference Date 21-24 June 2021
Submissions are double-blind, LNCS format 20+10 pages. Papers rejectedat the first round can be submitted at the second round, together with aresponse letter addressing the reviewer's points. We also welcome Systematization of Knowledge papers (distinguished with “SOK:” in the title).
Conference Topics
Areas of interest for ACNS 2021 include but are not limited to:
- Access control
- Applied cryptography
- Automated security analysis
- Biometric security/privacy
- Blockchain and cryptocurrencies
- Cloud security/privacy
- Complex systems security
- Critical infrastructure security
- Cryptographic primitives
- Cryptographic protocols
- Data protection
- Database/system security
- Digital rights management
- Email, app and web security
- Future Internet security
- Human factors in security
- Identity management
- IP protection
- Internet fraud, cybercrime
- Internet-of-Things (IoT) security
- Intrusion detection
- Key management
- Malware
- Mobile/wireless/5G security
- Network security protocols
- Privacy/anonymity, PETs
- Security/privacy metrics
- Side channel attacks (e.g., microarchitectural, physical-layer)
- Trust management
- Ubiquitous security/privacy
- Usable security/privacy
Submission Instructions
Submissions must not substantially duplicate work that any of theauthors has published elsewhere or has submitted in parallel to anyother venue with formally published proceedings. Information aboutsubmissions may be shared with program chairs of other conferences forthat purpose. Submissions must be anonymous, with no author names,affiliations, acknowledgement or obvious references. Each submissionmust begin with a title and short abstract. The introduction shouldsummarise the contributions of the paper at a level appropriatefor a non-specialist reader. All submissions must follow the originalLNCS format (see http://www.springeronline.com/lncs ) with a page limitof 20 pages (incl. references) for the main part (reviewers are notrequired to read beyond this limit) and 30 pages in total. Papers shouldbe submitted electronically in PDF format. Papers rejected at the firstround can be submitted at the second round (together with a responseletter). Submissions not meeting the submission guidelines riskrejection without consideration of their merits. We encouragesubmissions in LaTeX. Authors of accepted papers must guarantee thattheir paper will be presented at the conference and must make a fullversion of their paper available online. Note that the page limitfor camera-ready version is 20 pages with up to 10 additional pages ofAppendix.
Conflicts of Interests
We use the following definition on conflicts of Interest, based onUsenix Security’20: The program co-chairs require cooperation from bothauthors and program committee members to prevent submissions from beingevaluated by reviewers who have a conflict of interest. During thesubmission process, we will ask authors to identify members of theprogram committee with whom they share a conflict of interest. Thisincludes: (1) anyone who shares an institutional affiliation with anauthor at the time of submission, (2) anyone who was the advisor oradvisee of an author at any time in the past, (3) anyone the author hascollaborated or published with in the prior two years, (4) anyone who isserving as the sponsor or administrator of a grant that fundsyour research, or (5) close personal friendships. For other forms ofconflict, authors must contact the chairs and explain the perceivedconflict. Program committee members who are in conflict of interest witha paper, including program co-chairs, will be excluded from evaluationand discussion of the paper by default.
Organizing Committee
General Co-Chairs
- Chunhua Su, University of Aizu, Japan
- Kauzmasa Omote, University of Tsukuba, Japan
Program Co-Chairs
- Kazue Sako, Waseda University, Japan
- Nils Ole Tippenhauer, CISPA, Germany
Publicity Chair
- Keita Emura, NICT, Japan
Workshop Chair
- Jianying Zhou, Singapore University of Technology and Design, Singapore
Poster Chair
- Masaki Shimaoka, University of Tsukuba/SECOM CO., LTD., Japan
- Program Committee
- Mitsuaki Akiyama, NTT, Japan
- Cristina Alcaraz, University of Malaga, Spain
- Man Ho Au, The Hong Kong Polytechnic University, Hong Kong
- Lejla Batina, Radboud Universiteit, Netherlands
- Alex Biryukov, University of Luxembourg, Luxembourg
- Alexandra Boldyreva, Georgia Tech, USA
- Ferdinand Brasser, TU Darmstadt, Germany
- Chris Brzuska, Aalto University, Finland
- Alvaro Cardenas, University of California at Santa Clara, USA
- Sudipta Chattopadhyay, SUTD, Singapore
- Xiaofeng Chen, Xidian University, China
- Liqun Chen, University of Surrey, UK
- Jiska Classen, TU Darmstadt, Germany
- Hervé Debar, Télécom SudParis, France
- Stéphanie Delaune, IRISA, France
- Christian Doerr, TU Delft, Netherlands
- Nico Döttling, CISPA, Germany
- F. Betül Durak, Robert Bosch LLC, USA
- Karim Eldefrawy, SRI International, USA
- Zekeriya Erkin, TU Delft, Netherlands
- Olga Gadyatskaya, Leiden University, Netherlands
- Joaquin Garcia-Alfaro, Telecom SudParis, France
- Paolo Gasti, New York Institute of Technology, USA
- Dieter Gollmann, TUHH, Germany
- Stefanos Gritzalis, University of the Aegean, Greece
- Xinyi Huang, Fujian Normal University, China
- Antoine Joux, Sorbonne & CISPA, France
- Ghassan Karame, NEC Laboratories Europe, Germany
- Stefan Katzenbeisser, TU Darmstadt, Germany
- Hiroaki Kikuchi, Meiji University, Japan
- Qi Li, Tsinghua University, China
- Zhiqiang Lin, Ohio State University, USA
- Joseph Liu, Monash University, Australia
- Xiapu Luo, Hong Kong Polytechnic University, Hong Kong
- Emil Lupu, Imperial College, UK
- Di Ma, University of Michigan, USA
- Mark Manulis, University of Surrey, UK
- Takahiro Matsuda, AIST, Japan
- Sjouke Mauw, University of Luxembourg, Luxembourg
- Catherine Meadows, Naval Research Laboratory, USA
- Nele Mentens, KU Leuven, Belgium
- Kazuhiko Minematsu, NEC, Japan
- Veelasha Moonsamy, Radboud University, Netherlands
- Toru Nakanishi, Hiroshima University, Japan
- Satoshi Obana, Hosei University, Japan
- Martín Ochoa,Cyxtera Technologies, Colombia
- Wakaha Ogata, Tokyo Institute of Technology, Japan
- Miyako Okubo, NICT, Japan
- Roberto Di Pietro, HBKU, Qatar
- Christina Pöpper, New York University Abu Dhabi, UAE
- Aanjhan Ranganathan, Northeastern University, USA
- Joel Reardon, University of Calgary, Canada
- Ruben Rios, University of Malaga, Spain
- Sushmita Ruj, ISI Kolkata, India
- Mark Ryan, University of Birmingham, UK
- Rei Safavi-Naini, University of Calgary, Canada
- Kazue Sako (co-chair), Waseda University, Japan
- Steve Schneider, University of Surrey, UK
- Sooel Son, KAIST, Korea
- Hung-Min Sun, National Tsing Hua University, Taiwan
- Willy Susilo, University of Wollongong, Australia
- Pawel Szalachowski, Google, USA
- Vanessa Teague, Thinking Cybersecurity, Australia
- Qiang Tang, New Jersey Institute of Technology, USA
- Nils Ole Tippenhauer (co-chair), CISPA, Germany
- Selcuk Uluagac, FIU, USA
- Edgar Weippl, Vienna University of Technology, Austria
- Christian Wressnegger, KIT, Germany
- Kehuan Zhang, Chinese University of Hong Kong, Hong Kong