CANS 2009

From Openresearch
Revision as of 16:07, 27 February 2009 by 127.0.0.1 (talk) (Event created)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
CANS 2009
The 8th International Conference on Cryptology and Network Security
Dates Dec 12, 2009 (iCal) - Dec 14, 2009
Homepage: www.rcis.aist.go.jp/cans2009
Location
Location: Kanazawa, Japan
Loading map...

Important dates
Submissions: Jun 1, 2009
Camera ready due: Sep 4, 2009
Table of Contents


                  The 8th International Conference on
               CRYPTOLOGY AND NETWORK SECURITY (CANS 2009)

                         12 - 14 December 2009
                       Kanazawa, Ishikawa, Japan
              Web Page: http://www.rcis.aist.go.jp/cans2009/
                  Contact: cans2009-info@m.aist.go.jp

[Overview]
  The main goal of this conference is to promote research on all 
  aspects of network security, as well as to build a bridge between  
  research on cryptography and on network security. We therefore 
  welcome scientific and academic papers with this focus. Previous 
  CANS have been held in Taipei (2001), San Francisco (2002), Miami 
  (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), and Hong 
  Kong (2008).

[Topics]
  Areas of interest for CANS 2009 include, but are not limited to:
  - Ad Hoc and Sensor Network Security
  - Access Control for Networks
  - Anonymity and Pseudonymity
  - Authentication Services
  - Cryptographic Protocols and Schemes
  - Denial of Service Protection
  - Digital Rights Management
  - Fast Cryptographic Algorithms
  - Identity and Trust Management
  - Information Hiding and Watermarking
  - Internet and Router Security
  - Intrusion Detection and Prevention
  - Mobile and Wireless Network Security
  - Multicast Security
  - Phishing and Online Fraud Prevention
  - Peer-to-Peer Network Security
  - PKI
  - Security Modeling and Architectures
  - Secure Protocols (SSH, SSL, ...) and Applications
  - Spam Protection
  - Spyware Analysis and Detection
  - Virtual Private Networks

[Instructions for Authors]
  Papers on cryptology and network security are welcome. Papers that 
  make a substantial link between these areas will be given priority. 
  Authors of such papers are encouraged to elaborate on the relevant 
  connection in a subsection of the introduction. High-quality 
  papers on pure cryptology or pure network security may also be 
  accepted. 

  Submissions must not substantially duplicate work that any of the
  authors has published elsewhere or has submitted in parallel for 
  consideration of any other conference or workshop with proceedings. 
  Submissions should have at most 12 pages excluding the bibliography 
  and appendices, and at most 20 pages in total, using at least 
  11-point fonts and with reasonable margins. The total length of the
  final versions for Springer's LNCS will be at most 20 pages. 
  Committee members are not required to read appendices; the paper 
  should be intelligible without them. All submissions should be 
  anonymous. Authors of accepted papers must guarantee that at least 
  one of the authors will attend the conference and present their 
  paper. 

  Submitted papers should follow the formatting instructions of the
  Springer LNCS Style. Please check the Information for LNCS Authors 
  page at Springer at http://www.springer.com/lncs for style and 
  formatting guidelines. Submissions not meeting the submission 
  guidelines risk rejection without consideration of their merits.

[Proceedings]
  The conference proceedings are expected to be published in the 
  Lecture Notes in Computer Science series by Springer Verlag
  (http://www.springer.com/lncs), and be available at the conference.

[Important Dates]
  Submission Deadline    : 1 June 2009 (23:59:59 GMT)
  Acceptance Notification: 12 August 2009
  Camera-ready Copy Due  : 4 September 2009
  Conference             : 12 - 14 December 2009

[Best Paper Award]
  The Program Committee will consider giving a Best Paper Award to 
  the submission with highest merits. (Details to be announced.)

[Program Committee and Organizers]
Jointly Organized By:
  National Institute of Advanced Industrial Science and Technology 
  (AIST), Japan 
  Japan Advanced Institute of Science and Technology (JAIST), Japan

Supported By:
  Special Interest Group on Computer Security (CSEC), IPSJ, Japan
  Society of Information Theory and its Applications (SITA), Japan

Sponsored By:
  National Institute of Information and Communications Technology 
  (NICT), Japan 
  ComWorth Co., LTD, Japan

CANS Steering Committee:
  Yvo Desmedt           University College London, UK
  Matt Franklin         UC Davis, USA
  Lucas Hui             The University of Hong Kong, China
  Yi Mu                 University of Wollongong, Australia
  David Pointcheval     CNRS and ENS, France
  Huaxiong Wang         NTU, Singapore

General Chair:
  Akira Otsuka          AIST, Japan

Program Co-Chairs:
  Juan A. Garay         AT&T Labs - Research, USA
  Atsuko Miyaji         JAIST, Japan

Program Committee:
  Jean-Luc Beuchat      Tsukuba Univ, Japan
  Alexandra Boldyreva   Georgia Tech, US
  Colin Boyd            Queensland, Australia
  Emmanuel Bresson      ENS, France
  Mike Burmester        FSU, US
  Koji Chida            NTT Labs, Japan
  Ee-Chien Chang        National University of Singapore, Singapore
  Rosario Gennaro       IBM Watson, US
  Trevor Jim            AT&T Labs - Research, US
  Charanjit Jutla       IBM Watson, US
  Senny Kamara          Microsoft Research, US
  Aggelos Kiayias       UConn, US
  Vladimir Kolesnikov   Bell Labs, US
  Dong Hoon Lee         Korea Univ, Korea
  Pil Joong Lee         Pohang University of Science and Technology, Korea
  Subhamoy Maitra       Indian Statistical Institute, India
  Mark Manulis          TU Darmstadt, Germany
  David Nowak           AIST, Japan
  Wakaha Ogata          Tokyo Institute of Technology, Japan
  Kenny Paterson        Royal Holloway, University of London, UK
  Rene Peralta          NIST, US
  Josef Pieprzyk        Macquarie University, Australia
  C. Pandu Rangan       IIT Madras, India
  German Saez           UPC, Spain
  Adam Smith            Penn State Univ, US
  Jessica Staddon       PARC, US
  Douglas Stinson       University of Waterloo, Canada
  Willy Susilo          University of Wollongong, Australia
  Tsuyoshi Takagi       Future University - Hakodate, Japan
  Gene Tsudik           UC Irvine, US
  Ivan Visconti         University of Salerno, Italy
  Duncan S Wong         Department of Computer Science City University
                        of Hong Kong, China
  Sung-Ming Yen         National Central University, Taiwan
  Hong-Sheng Zhou       UConn, US
  Jianying Zhou         I2R, Singapore

Organizing Committee:
  Tomoyuki Asano        Sony, Japan
  Isao Echizen          NII, Japan
  Shoichi Hirose        University of Fukui, Japan
  Atsuo Inomata         NAIST, Japan
  Daisuke Inoue         NICT, Japan
  Shinichiro Matsuo     NTT Data, Japan
  Tatsuyuki Matsushita  Toshiba, Japan
  Natsume Matsuzaki     Panasonic, Japan
  Kunihiko Miyazaki     Hitachi, Japan
  Takao Ogura           Fujitsu Laboratories, Japan
  Yutaka Oiwa           AIST, Japan
  Takeshi Okamoto       Tsukuba University of Technology, Japan
  Kazumasa Omote        JAIST, Japan
  Kensuke Shibata       NTT Labs, Japan
  Yuji Suga             IIJ, Japan
  Toshihiro Tabata      Okayama University, Japan
  Katsuyuki Takashima   Mitsubishi Electric, Japan
  Keisuke Takemori      KDDI R&D Labs., Japan
  Shoko Yonezawa        AIST, Japan
	

This CfP was obtained from WikiCFP

Facts about "CANS 2009"
AcronymCANS 2009 +
Camera ready dueSeptember 4, 2009 +
End dateDecember 14, 2009 +
Event typeConference +
Has coordinates36° 34' 41", 136° 38' 53"Latitude: 36.57805
Longitude: 136.648025
+
Has location cityKanazawa +
Has location countryCategory:Japan +
Homepagehttp://www.rcis.aist.go.jp/cans2009 +
IsAEvent +
Start dateDecember 12, 2009 +
Submission deadlineJune 1, 2009 +
TitleThe 8th International Conference on Cryptology and Network Security +