Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

CANS 2009 Call for Papers

1 view
Skip to first unread message

Yoshitaka Ikeda

unread,
Jun 3, 2009, 2:40:27 AM6/3/09
to
国際会議 CANS 2009 の投稿締切が6/11まで延長されました.
ネットワークセキュリティから暗号理論まで,
幅広いトピックでの論文投稿をお待ち申し上げております.

投稿締切:2009年 6月11日(採録論文はLNCSとして出版)
会議日程:2009年12月12-14日
開催場所:石川県立美術館

複数受け取られた方にはご容赦いただければ幸いです.

[Apologies if you receive multiple copies]

--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * ---

- Call for Papers -

The 8th International Conference on
CRYPTOLOGY AND NETWORK SECURITY (CANS 2009)

12 - 14 December 2009
Kanazawa, Ishikawa, Japan
Web Page: http://www.rcis.aist.go.jp/cans2009/
Contact: cans20...@m.aist.go.jp

[Overview]
The main goal of this conference is to promote research on all
aspects of network security, as well as to build a bridge between
research on cryptography and on network security. We therefore
welcome scientific and academic papers with this focus. Previous
CANS have been held in Taipei (2001), San Francisco (2002), Miami
(2003), Xiamen (2005), Suzhou (2006), Singapore (2007), and Hong
Kong (2008).

[Topics]
Areas of interest for CANS 2009 include, but are not limited to:
- Ad Hoc and Sensor Network Security
- Access Control for Networks
- Anonymity and Pseudonymity
- Authentication Services
- Cryptographic Protocols and Schemes
- Denial of Service Protection
- Digital Rights Management
- Fast Cryptographic Algorithms
- Identity and Trust Management
- Information Hiding and Watermarking
- Internet and Router Security
- Intrusion Detection and Prevention
- Mobile and Wireless Network Security
- Multicast Security
- Phishing and Online Fraud Prevention
- Peer-to-Peer Network Security
- PKI
- Security Modeling and Architectures
- Secure Protocols (SSH, SSL, ...) and Applications
- Spam Protection
- Spyware Analysis and Detection
- Virtual Private Networks

[Instructions for Authors]
Papers on cryptology and network security are welcome. Papers that
make a substantial link between these areas will be given priority.
Authors of such papers are encouraged to elaborate on the relevant
connection in a subsection of the introduction. High-quality
papers on pure cryptology or pure network security may also be
accepted.

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel for
consideration of any other conference or workshop with proceedings.
Submissions should have at most 12 pages excluding the bibliography
and appendices, and at most 20 pages in total, using at least
11-point fonts and with reasonable margins. The total length of the
final versions for Springer's LNCS will be at most 20 pages.
Committee members are not required to read appendices; the paper
should be intelligible without them. All submissions should be
anonymous. Authors of accepted papers must guarantee that at least
one of the authors will attend the conference and present their
paper.

Submitted papers should follow the formatting instructions of the
Springer LNCS Style. Please check the Information for LNCS Authors
page at Springer at http://www.springer.com/lncs for style and
formatting guidelines. Submissions not meeting the submission
guidelines risk rejection without consideration of their merits.

[Proceedings]
The conference proceedings will be published in the Lecture Notes
in Computer Science series by Springer Verlag
(http://www.springer.com/lncs), and be available at the conference.

[Important Dates]
Submission Deadline : 11 June 2009 (23:59:59 JST)
Acceptance Notification : 14 August 2009 (JST)
Camera-ready Copy Due : 4 September 2009
Conference : 12 - 14 December 2009

[Confirmed Invited Speakers]
Adrian Perrig CMU, US

[Best Paper Award]
The Program Committee will consider giving a Best Paper Award to
the submission with highest merits. (Details to be announced.)

[Stipend]
A limited number of stipends are available to those unable to obtain
funding to attend the conference, and to students whose papers are
accepted and who will present the paper themselves. Requests for
stipends should be addressed to the general chair by August 31st.

[Program Committee and Organizers]
Jointly Organized By:
National Institute of Advanced Industrial Science and Technology
(AIST), Japan
Japan Advanced Institute of Science and Technology (JAIST), Japan

Supported By:
Special Interest Group on Computer Security (CSEC), IPSJ, Japan
Technical Group on Information Security (ISEC), IEICE, Japan
Technical Committee on Information and Communication System
Security (ICSS), IEICE, Japan
Society of Information Theory and its Applications (SITA), Japan

Sponsored By:
National Institute of Information and Communications Technology
(NICT), Japan
Institute of Regional Information Systems (IRIS), Japan
ComWorth Co., LTD, Japan
Hitachi, Ltd., Japan

CANS Steering Committee:
Yvo Desmedt University College London, UK
Matt Franklin UC Davis, USA
Lucas Hui The University of Hong Kong, China
Yi Mu University of Wollongong, Australia
David Pointcheval CNRS and ENS, France
Huaxiong Wang NTU, Singapore

General Chair:
Akira Otsuka AIST, Japan

Program Co-Chairs:
Juan A. Garay AT&T Labs - Research, USA
Atsuko Miyaji JAIST, Japan

Program Committee:
Jean-Luc Beuchat Tsukuba Univ, Japan
Alexandra Boldyreva Georgia Tech, US
Colin Boyd Queensland Univ of Technology, Australia
Emmanuel Bresson DCSSI Crypto Lab, France
Mike Burmester FSU, US
Koji Chida NTT Labs, Japan
Ee-Chien Chang National University of Singapore, Singapore
Rosario Gennaro IBM Watson, US
Trevor Jim AT&T Labs - Research, US
Charanjit Jutla IBM Watson, US
Seny Kamara Microsoft Research, US
Aggelos Kiayias UConn, US
Vladimir Kolesnikov Bell Labs, US
Tanja Lange Technical University Eindhoven, Netherlands
Dong Hoon Lee Korea Univ, Korea
Pil Joong Lee Pohang University of Science and Technology, Korea
Benoit Libert UCL, Belgium
Helger Lipmaa Cybernetica AS, Estonia
Subhamoy Maitra Indian Statistical Institute, India
Mark Manulis TU Darmstadt, Germany
David Nowak AIST, Japan
Wakaha Ogata Tokyo Institute of Technology, Japan
C. Pandu Rangan IIT Madras, India
Kenny Paterson Royal Holloway, University of London, UK
Rene Peralta NIST, US
Josef Pieprzyk Macquarie University, Australia
German Saez UPC, Spain
Taizo Shirai Sony, Japan
Adam Smith Penn State Univ, US
Jessica Staddon PARC, US
Douglas Stinson University of Waterloo, Canada
Willy Susilo University of Wollongong, Australia
Tsuyoshi Takagi Future University - Hakodate, Japan
Gene Tsudik UC Irvine, US
Ivan Visconti University of Salerno, Italy
Xiaoyun Wang Shandong University, China
Duncan S Wong City University of Hong Kong, China
Sung-Ming Yen National Central University, Taiwan
Hong-Sheng Zhou UConn, US
Jianying Zhou I2R, Singapore

Organizing Committee:
Tomoyuki Asano Sony, Japan
Isao Echizen NII, Japan
Shoichi Hirose University of Fukui, Japan
Atsuo Inomata NAIST, Japan
Daisuke Inoue NICT, Japan
Shinichiro Matsuo NICT, Japan
Tatsuyuki Matsushita Toshiba, Japan
Natsume Matsuzaki Panasonic, Japan
Kunihiko Miyazaki Hitachi, Japan
Takao Ogura Fujitsu Laboratories, Japan
Yutaka Oiwa AIST, Japan
Takeshi Okamoto Tsukuba University of Technology, Japan
Kazumasa Omote JAIST, Japan
Kensuke Shibata NTT Labs, Japan
Yuji Suga IIJ, Japan
Toshihiro Tabata Okayama University, Japan
Katsuyuki Takashima Mitsubishi Electric, Japan
Keisuke Takemori KDDI R&D Labs., Japan
Shoko Yonezawa AIST, Japan

--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --
--
I LOVE SNOOPY! でつ
Yoshitaka Ikeda mailto:ik...@4bn.ne.jp
My Honeypot: ho...@4bn.ne.jp <-don't send this address

0 new messages