Call for Papers PDF

The 15th International Conference on Applied Cryptography and Network Security (ACNS2017) will be held in Kanazawa, Japan on July 2017. It will be co-organized by Osaka University, Japan Advanced Institute of Science and Technology (JAIST), and the Information-technology Promotion Agency (IPA).

ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. Both academic research works with high relevance to real-world problems as well as developments in industrial and technical frontiers fall within the scope of the conference.

The previous ACNS conference series were successfully held in Kunming, China (2003), Yellow Mountain, China (2004), New York, USA (2005), Singapore (2006), Zhuhai, China (2007), New York, USA (2008), Paris, France (2009), Beijing, China (2010), Malaga, Spain (2011), Singapore (2012), Banff, Canada (2013), Lausanne, Switzerland (2014), New York, USA (2015) and London, UK (2016). The conference proceedings are published in LNCS series.

Conference Topics

Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (including performance measurements, usability studies) of algorithms / protocols / standards / implementations / technologies / devices / systems, standing in close relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include, but are not limited to:

Access control Future Internet security Pervasive security
Applied cryptography Identity management Security in e-commerce
Automated security analysis IP protection Security in P2P systems
Complex systems security Internet fraud, cybercrime Security in grid systems
Critical infrastructures Internet-of-Things security Cloud security/privacy
Cryptographic primitives Intrusion detection Security/privacy metrics
Cryptographic protocols Key management Trust management
Data protection Malware Ubiquitous security/privacy
Database/system security Mobile/wireless/5G security Human factors in security
Digital rights management Network security protocols Usability in security/privacy
Email and web security Privacy/anonymity, PETs

Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award (the eligibility will be clarified with authors of accepted papers following the notification). Papers should be submitted electronically through EasyChair.