CANS 2021: Difference between revisions
No edit summary |
No edit summary |
||
| Line 20: | Line 20: | ||
}} | }} | ||
==== Areas of Interest ==== | ==== Areas of Interest ==== | ||
* • Access Control | |||
• Access Control | * • Embedded System Security | ||
• Embedded System Security | * • Security in Pervasive Systems | ||
• Security in Pervasive Systems | * • Anonymity & Pseudonymity | ||
• Anonymity & Pseudonymity | * • Formal Methods for Security | ||
• Formal Methods for Security | * • Security in Social Networks | ||
• Security in Social Networks | * • Applied Cryptography | ||
• Applied Cryptography | * • Hash Functions | ||
• Hash Functions | * • Sensor Network Security | ||
• Sensor Network Security | * • Attacks & Malicious Code | ||
• Attacks & Malicious Code | * • Identity Management | ||
• Identity Management | * • Trust Management | ||
• Trust Management | * • Authentication & Identification | ||
• Authentication & Identification | * • Key Management | ||
• Key Management | * • Usable Security | ||
• Usable Security | * • Biometrics | ||
• Biometrics | * • Language-Based Security | ||
• Language-Based Security | * • Virtual Private Networks | ||
• Virtual Private Networks | * • Block & Stream Ciphers | ||
• Block & Stream Ciphers | * • Malware Analysis and Detection | ||
• Malware Analysis and Detection | * • Wireless and Mobile Security | ||
• Wireless and Mobile Security | * • Blockchain Security and Privacy | ||
• Blockchain Security and Privacy | * • Network Security | ||
• Network Security | * • Peer-to-Peer Security & Privacy | ||
• Peer-to-Peer Security & Privacy | * • Cryptographic Algorithms and Primitives | ||
• Cryptographic Algorithms and Primitives | * • Security and Privacy for Big Data | ||
• Security and Privacy for Big Data | * • Privacy-Enhancing Technologies | ||
• Privacy-Enhancing Technologies | * • Cryptographic Protocols | ||
• Cryptographic Protocols | * • Security and Privacy in the Cloud | ||
• Security and Privacy in the Cloud | * • Public Key Cryptography | ||
• Public Key Cryptography | * • Cyberphysical Security | ||
• Cyberphysical Security | * • Security in Content Delivery | ||
• Security in Content Delivery | * • Secure Distributed Computing | ||
• Secure Distributed Computing | * • Data and Application Security | ||
• Data and Application Security | * • Security in Crowdsourcing | ||
• Security in Crowdsourcing | * • Security Architectures | ||
• Security Architectures | * • Denial of Service Protection | ||
• Denial of Service Protection | * • Security in Grid Computing | ||
• Security in Grid Computing | * • Security Metrics | ||
• Security Metrics | * • Data Protection | ||
• Data Protection | * • Security in the Internet of Things | ||
• Security in the Internet of Things | * • Security Models | ||
• Security Models | * • Data and Computation Integrity | ||
• Data and Computation Integrity | * • Security in Location Services | ||
• Security in Location Services | * • Security Policies | ||
• Security Policies | |||
Latest revision as of 15:40, 11 February 2021
| CANS 2021 | |
|---|---|
International Conference on Cryptology and Network Security
| |
| Ordinal | 20 |
| Event in series | CANS |
| Dates | 2021/12/13 (iCal) - 2021/12/15 |
| Homepage: | https://cans2021.at/ |
| Twitter account: | @CansConference |
| Submitting link: | https://easychair.org/conferences/?conf=cans2021 |
| Location | |
| Location: | Vienna, Austria |
| Important dates | |
| Papers: | 2021/06/01 |
| Submissions: | 2021/06/01 |
| Notification: | 2021/09/01 |
| Camera ready due: | 2021/10/01 |
| Committees | |
| General chairs: | Stephan Krenn |
| PC chairs: | Mauro Conti, Marc Stevens |
| Table of Contents | |
| Tweets by @CansConference | |
The following coordinate was not recognized: Geocoding failed.The following coordinate was not recognized: Geocoding failed.
Areas of Interest
- • Access Control
- • Embedded System Security
- • Security in Pervasive Systems
- • Anonymity & Pseudonymity
- • Formal Methods for Security
- • Security in Social Networks
- • Applied Cryptography
- • Hash Functions
- • Sensor Network Security
- • Attacks & Malicious Code
- • Identity Management
- • Trust Management
- • Authentication & Identification
- • Key Management
- • Usable Security
- • Biometrics
- • Language-Based Security
- • Virtual Private Networks
- • Block & Stream Ciphers
- • Malware Analysis and Detection
- • Wireless and Mobile Security
- • Blockchain Security and Privacy
- • Network Security
- • Peer-to-Peer Security & Privacy
- • Cryptographic Algorithms and Primitives
- • Security and Privacy for Big Data
- • Privacy-Enhancing Technologies
- • Cryptographic Protocols
- • Security and Privacy in the Cloud
- • Public Key Cryptography
- • Cyberphysical Security
- • Security in Content Delivery
- • Secure Distributed Computing
- • Data and Application Security
- • Security in Crowdsourcing
- • Security Architectures
- • Denial of Service Protection
- • Security in Grid Computing
- • Security Metrics
- • Data Protection
- • Security in the Internet of Things
- • Security Models
- • Data and Computation Integrity
- • Security in Location Services
- • Security Policies