[ias-opportunities] Deadline extended: April 24. CANS2024, Cambridge, UK

1 view
Skip to first unread message

Natalia Stakhanova

unread,
Apr 8, 2024, 1:50:40 PMApr 8
to ias-opportunities

Conference on Cryptology And Network Security (CANS)   https://2024.cansconference.org/call-for-papers
24th-27th September 2024

Cambridge, UK

The deadline for submissions is ​EXTENDED to​ 24 April, 2024 anywhere on earth (AoE).

Notification:                17 June​, 2024

Camera-ready:            1 July​, 2024   

Conference:                24-27 September


Camera-ready:            1 July​, 2024   

Conference:                24-27 September

 

Papers must be submitted via EasyChair: https://easychair.org/my/conference?conf=cans24

The International Conference on Cryptology and Network Security (CANS)
is a premier forum for presenting research in the field of cryptology
and network security. The conference seeks academic, industry, and
government submissions on all theoretical and practical cryptology and
network security aspects.

Topic areas include:
  * Access Control                                    * Malware Analysis and Detection
  * Anonymity and Censorship Resistance               * Network Security
  * Applied Cryptography                              * On-line Social Networks Security and Privacy
  * Artificial Intelligence for Security              * Peer-to-Peer Security and Privacy
  * Attacks & Malicious Code                          * Privacy-Enhancing Technologies
  * Biometrics                                        * Public Key Cryptography
  * Block & Stream Ciphers                            * Security and Privacy for Big Data
  * Blockchain Security and Privacy                   * Security and Privacy in the Cloud
  * Cognitive Cities Security and Privacy             * Security and Privacy of ML and AI based Systems
  * Confidential Computing                            * Security and Resilient solutions for Critical Infrastructures (e.g., Smart Grid, TelCo Networks, AirPorts, Ports…)
  * Cryptographic Algorithms and Primitives           * Security Architectures
  * Cryptographic Protocols                           * Security in Content Delivery
  * Cyber Physical Security                           * Security Models
  * Data and Application Security                     * Secure Multi-Party Computation
  * Denial of Service Protection                      * Secure Distributed Computing
  * Data and Computation Integrity                    * Security in Pervasive Systems
  * Edge/Fog Computing Security and Privacy           * Sensor Network Security
  * Embedded System Security                          * Security in Crowdsourcing
  * Formal Methods for Security and Privacy           * Trust Management
  * Hash Functions                                    * Usable Security
  * Identity Management and Privacy                   * Virtual Private Networks
  * IoT Security                                      * Web Security
  * Key Management                                    * Wireless and Mobile Security
  * Location Based Services Security and Privacy      * Zero-Knowledge Proofs




Reply all
Reply to author
Forward
0 new messages