Deadlines
|
||
Submission |
|
||
Paper |
|
||
Notification |
Metrics
Submitted Papers
51
Accepted Papers
18
Accepted Short Papers
6
Venue
Cairns, Australia
Warning: Venue is missing. The map might not show the exact location.
Topics
Areas of interest include, but are not limited to:
- Asymmetric provably secure cryptography
- Symmetric cryptographic primitives
- Lattice-based security reductions
- Leakage-resilient cryptography
- Privacy and anonymity technologies
- Secure cryptographic protocols and applications
- Security notions, approaches, and paradigms
- Steganography and steganalysis
- Blockchain and Cryptocurrency
- IoT Security
- Mobile security
- Cloud security
- Access control
- Privacy enhanced technology
- Viruses and malware
- Software security
- Database security
- Web security
- Operating system security
- Intrusion detection
- Big data security and privacy
- Biometric Security
- Network security
- Formal methods for security
- Digital forensics
- Security for critical infrastructures
- Embedded systems security
- Lightweight security
- Smart grid security
- Cyber-physical security
Important dates
Proceedings including all accepted papers will be published in LNCS and will be available at the conference.