您的当前位置:首页新闻中心学术活动
Inscrypt 2014 2nd CALL FOR PAPERS
文章来源: 发布时间:2014-08-12 【字号:

 

2nd CALL FOR PAPERS 10th International Conference on Information Security and Cryptology

(Inscrypt 2014) 

 

http://www.inscrypt.cn/

-In Cooperation with IACR -December 13 - 15, 2014, Beijing, China

General Chair:

Xiaoyun Wang, Tsinghua University, China

Program Chairs:

Dongdai Lin, SKLOIS, Institute of Information Engineering, CAS, China

Moti Yung, Google Inc. Columbia University, USA

Jianying Zhou, Institute for Infocomm Research, Singapore

Organization Chairs:

Yanping Yu, Chinese Association for Cryptologic Research, China

Chuankun Wu, SKLOIS, Institute of Information Engineering, CAS, China

Yongbin Zhou, SKLOIS, Institute of Information Engineering, CAS, China

Publicity Chair:

Chen Yu, SKLOIS, Institute of Information Engineering, CAS, China

Secretary:

Miao Liu, SKLOIS, Institute of Information Engineering, CAS, China

Webpage:

Qi Dai, SKLOIS, Institute of Information Engineering, CAS, China

Conference Email:

Inscrypt2014@easychair.org

The 10th China International Conference on Information Security and Cryptology (Inscrypt 2014) will be held in Beijing, from December 13 to 15, 2014, co-organized by the State Key Laboratory of Information Security, the Chinese Association for Cryptologic Research of China, and In Cooperation with IACR. It is an annual conference targeting the top research results in the related area. Topics of interest encompass research advances in ALL areas of

information security, cryptology, and their applications. Inscrypt 2014 seeks high-quality research contributions in the form of well-developed papers. The conference proceedings will be published by Springer-Verlag in LNCS series.

Papers

Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:

Access Control

Authentication and Authorization

Biometric Security

Distributed System Security

Big Data and Cloud Security

Electronic Commerce Security

Intrusion Detection

Information Hiding and Watermarking

Key Management and Key Recovery

Network Security

Security Protocols and Their Analysis

Security Modeling and Architectures

Provable Security

Secure Multiparty Computation

Foundations of Cryptography

Secret Key and Public Key Cryptosystems

Implementation of Cryptosystems

Hash Functions and MACs

Block Cipher Modes of Operation

Intellectual Property Protection

Mobile System Security

Operating System Security

Risk Evaluation and Security Certification

Prevention and Detection of Malicious Codes

 

Instruction for Authors

Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to http://www.easychair.org/conferences/?conf=inscrypt2014. Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format. More information can be found at conference web site http://www.inscrypt.cn/.

 

Important Dates

Deadline for Submission:                             August 31, 2014

Notification of Acceptance:                          November 7, 2014

Pre-proceedings version deadline:                 November 15, 2014

Proceedings version deadline:                       December 31, 2014

 

Technical Program Committee

Cristina

Alcaraz

University of Malaga, Spain

Basel

Alomair

King Abdulaziz City for Science and Technology & University of Washington,USA

Man Ho

Au

University of Wollongong,Australia

Elisa

Bertino

Purdue University,USA

Ioana

Boureanu

EPFL, Lausanne, Switzerland

Zhenfu

Cao

Shanghai Jiao Tong University, China

Bogdan

Carbunar

Florida International University, USA

Yu

Chen

Institute of Information Engineering, CAS, China

Kefei

Chen

Shanghai Jiaotong University, China

Liqun

Chen

Hewlett-Packard Laboratories, UK

Songqing

Chen

George Mason University,USA

Cunsheng

Ding

Hong Kong University of Science and Technology, China

Jintai

Ding

University of Cincinnati, USA

Xuhua

Ding

Singapore Management University, Singapore

Shlomi

Dolev

Ben-Gurion  University of the Negev, Israel

Chun-I

Fan

National Sun Yat-sen University, Taiwan

Sara

Foresti

DI - Universita` degli Studi di Milano, Italy

Dieter

Gollmann

Hamburg University of Technology, Germany

Stefanos

Gritzalis

University of the Aegean, Greece

Huaqun

Guo

Institute for Infocomm Research, Singapore

Jinguang

Han

Nanjing University of Finance and Economics, China

Feng

Hao

Newcastle University, UK

Matt

Henricksen

Institute For Infocomm Research, Singapore

Xinyi

Huang

Fujian Normal University, China

Matthias

Krause

University of Mannheim, Germany

Xuejia

Lai

Shanghai Jiaotong University, China

Costas

Lambrinoudakis

University of Piraeus, Greece

Jiguo

Li

Hohai University,China

Chao

Li

National Defense University of Science and Technology, China

Hui

Li

Xidian University, China

Peng

Liu

The Pennsylvania State University, USA

Xiapu

Luo

The Hong Kong Polytechnic University

Subhamoy

Maitra

Indian Statistical Institute, India

Florian

Mendel

Graz University of Technology, Austria

Chris

Mitchell

Royal Holloway, University of London, UK

Atsuko

Miyaji

Japan Advanced Institute of Science and Technology, Japan

Yi

Mu

University of Wollongong, Australia

Claudio

Orlandi

Aarhus University, Denmark

Xinming

Ou

Kansas State University, USA

Giuseppe

Persiano

Università di Salerno, Italy

Bertram

Poettering

Royal Holloway, University of London, UK

Radha

Poovendran

University of Washington, USA

Giovanni

Russello

The University of Auckland, New Zealand

Kouichi

Sakurai

Kyushu University,Japan

Willy

Susilo

University of Wollongong, Australia

Tsuyoshi

Takagi

Kyushu University, Japan

Wen-Guey

Tzeng

National Chiao Tung University, Taiwan

Yevgeniy

Vahlis

University of Toronto, Canada

Wenling

Wu

Institute of Software, CAS, China

Yang

Xiang

Deakin University, Australia

Shouhuai

Xu

University of Texas at San Antonio, USA

Jia

Xu

Institute for Infocomm Research, Singapore

Danfeng

Yao

Virginia Tech, USA

Mingwu

Zhang

Hubei University of Technology, China

Rui

Zhang

Chinese Academy of Sciences, China

Fangguo

Zhang

Sun Yat-sen University, China

Futai

Zhang

Nanjing Normal University, China

Yuliang

Zheng

UNC Charlotte, USA

Hong-Sheng

Zhou

Virginia Commonwealth University, USA

Cliff

Zou

University of Central Florida, USA

10th International Conference on Information Security and Cryptology (Inscrypt 2014, http://www.inscrypt.cn) Dec. 13-15, 2014.
附件: