The 15th International Conference on Applied Cryptography and Network Security (ACNS2017) will be held in Kanazawa, Japan on July 2017. It will be co-organized by Osaka University, Japan Advanced Institute of Science and Technology (JAIST), and the Information-technology Promotion Agency (IPA).
ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. Both academic research works with high relevance to real-world problems as well as developments in industrial and technical frontiers fall within the scope of the conference.
The previous ACNS conference series were successfully held in Kunming, China (2003), Yellow Mountain, China (2004), New York, USA (2005), Singapore (2006), Zhuhai, China (2007), New York, USA (2008), Paris, France (2009), Beijing, China (2010), Malaga, Spain (2011), Singapore (2012), Banff, Canada (2013), Lausanne, Switzerland (2014), New York, USA (2015) and London, UK (2016). The conference proceedings are published in LNCS series.
Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (including performance measurements, usability studies) of algorithms / protocols / standards / implementations / technologies / devices / systems, standing in close relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art. Topics of interest include, but are not limited to:
|Access control||Future Internet security||Pervasive security|
|Applied cryptography||Identity management||Security in e-commerce|
|Automated security analysis||IP protection||Security in P2P systems|
|Complex systems security||Internet fraud, cybercrime||Security in grid systems|
|Critical infrastructures||Internet-of-Things security||Cloud security/privacy|
|Cryptographic primitives||Intrusion detection||Security/privacy metrics|
|Cryptographic protocols||Key management||Trust management|
|Data protection||Malware||Ubiquitous security/privacy|
|Database/system security||Mobile/wireless/5G security||Human factors in security|
|Digital rights management||Network security protocols||Usability in security/privacy|
|Email and web security||Privacy/anonymity, PETs|