Difference between revisions of "Event:ProvSec 2020"

From ConfIDent
(mobo import Concept___Events-migrated)
(mobo import Concept___Events-migrated)
Line 3: Line 3:
 
|Title=14th International Conference on Provable and Practical Security
 
|Title=14th International Conference on Provable and Practical Security
 
|Type=Conference
 
|Type=Conference
|Submission deadline=2020/06/05
 
 
|Homepage=http://scripts.ntu.edu.sg/NewsnEvents/Pages/Events-PROVSEC2020.aspx
 
|Homepage=http://scripts.ntu.edu.sg/NewsnEvents/Pages/Events-PROVSEC2020.aspx
 
|Twitter account=@NTUsg
 
|Twitter account=@NTUsg
 
|City=Singapore
 
|City=Singapore
 
|Country=Country:SG
 
|Country=Country:SG
|Notification=2020/07/22
 
|Camera ready=2020/08/05
 
 
|Has host organization=Strategic Centre for Research in Privacy-Preserving Technological Systems
 
|Has host organization=Strategic Centre for Research in Privacy-Preserving Technological Systems
 
|has general chair=Kwok Yan Lam, Huaxiong Wang
 
|has general chair=Kwok Yan Lam, Huaxiong Wang
Line 23: Line 20:
 
|Event Mode=on site
 
|Event Mode=on site
 
}}
 
}}
 +
{{Event Deadline
 +
|Notification Deadline=2020/07/22
 +
|Camera-Ready Deadline=2020/08/05
 +
|Submission Deadline=2020/06/05
 +
}}
 +
{{S Event}}
 
<big>Topics</big>
 
<big>Topics</big>
  

Revision as of 20:50, 22 September 2022

Deadlines
2020-07-22
2020-08-05
2020-06-05
5
Jun
2020
Submission
22
Jul
2020
Notification
5
Aug
2020
Camera-Ready
Venue

Singapore

Loading map...

Topics

ProvSec 2020 - the 14th International Conference on Provable and Practical Security - will take place in Singapore from 22 September to 25 September 2020. Authors are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:

  • Provable security for asymmetric cryptography
  • Provable security for symmetric cryptography
  • Provable security for physical attacks
  • Privacy and anonymity technologies
  • Secure cryptographic protocols and applications
  • Security notions, approaches, and paradigms
  • Leakage-resilient cryptography
  • Lattice-based cryptography and post-quantum cryptography
  • Steganography and steganalysis
  • Blockchain and Cryptocurrency
  • IoT Security
  • Cloud security
  • Access control
  • Privacy-enhancing technologies
  • Database security
  • Big data security and privacy
  • Biometric Security
  • Network security
  • Formal methods for security
  • Embedded systems security
  • Lightweight security
  • Cyber-physical security


Conference Proceedings

Proceedings will be published in Springer's Lecture Notes in Computer Science and will be available at the conference.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.