Difference between revisions of "Event:SCN 2020"

From ConfIDent
(mobo import Concept___Events-migrated)
(mobo import Concept___Events-migrated)
Line 3: Line 3:
 
|Title=The Twelfth Conference on Security and Cryptography for Networks
 
|Title=The Twelfth Conference on Security and Cryptography for Networks
 
|Type=Conference
 
|Type=Conference
|Submission deadline=2020/04/19
 
 
|Homepage=https://scn.unisa.it/
 
|Homepage=https://scn.unisa.it/
 
|City=Amalfi
 
|City=Amalfi
 
|Country=Country:IT
 
|Country=Country:IT
|Paper deadline=2020/04/19
 
|Notification=2020/06/14
 
|Camera ready=2020/06/28
 
 
|Has coordinator=International Association for Cryptologic Research
 
|Has coordinator=International Association for Cryptologic Research
 
|has general chair=Clemente Galdi
 
|has general chair=Clemente Galdi
Line 24: Line 20:
 
|Event Mode=on site
 
|Event Mode=on site
 
}}
 
}}
 +
{{Event Deadline
 +
|Paper Deadline=2020/04/19
 +
|Notification Deadline=2020/06/14
 +
|Camera-Ready Deadline=2020/06/28
 +
|Submission Deadline=2020/04/19
 +
}}
 +
{{S Event}}
 
== Topics ==
 
== Topics ==
 
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:     
 
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:     

Revision as of 20:56, 22 September 2022

Deadlines
2020-06-14
2020-04-19
2020-06-28
2020-04-19
19
Apr
2020
Submission
19
Apr
2020
Paper
14
Jun
2020
Notification
28
Jun
2020
Camera-Ready
Venue

Amalfi, Italy

Loading map...

Topics

All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:

  • Anonymity and Privacy
  • Applied Cryptography and Implementations
  • Authentication, Identification and Access Control
  • Block and Stream Ciphers
  • Complexity-Theoretic Cryptography
  • Cloud Computing Security
  • Cryptanalysis
  • Cryptocurrencies
  • Cryptographic Hash Functions
  • Cryptographic and Security Protocols
  • Digital Signatures and Message Authentication Codes
  • Distributed Systems Security
  • Formal Security Methods
  • Information-Theoretic Security
  • Network, Web and Wireless Security
  • Public-Key Encryption
  • Physical Cryptography
  • Security Architectures and Models
  • Software and Systems Security
Cookies help us deliver our services. By using our services, you agree to our use of cookies.