(mobo import Concept___Event_For_Confident-migrated) |
m (Text replacement - "Homepage=" to "Official Website=") |
||
(2 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
|Title=The Twelfth Conference on Security and Cryptography for Networks | |Title=The Twelfth Conference on Security and Cryptography for Networks | ||
|Type=Conference | |Type=Conference | ||
− | | | + | |Official Website=https://scn.unisa.it/ |
− | |||
|City=Amalfi | |City=Amalfi | ||
− | |Country= | + | |Country=Country:IT |
− | |||
− | |||
− | |||
|Has coordinator=International Association for Cryptologic Research | |Has coordinator=International Association for Cryptologic Research | ||
|has general chair=Clemente Galdi | |has general chair=Clemente Galdi | ||
Line 21: | Line 17: | ||
|Start Date=2020/09/14 | |Start Date=2020/09/14 | ||
|End Date=2020/09/16 | |End Date=2020/09/16 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=on site | ||
}} | }} | ||
+ | {{Event Deadline | ||
+ | |Paper Deadline=2020/04/19 | ||
+ | |Notification Deadline=2020/06/14 | ||
+ | |Camera-Ready Deadline=2020/06/28 | ||
+ | |Submission Deadline=2020/04/19 | ||
+ | }} | ||
+ | {{S Event}} | ||
== Topics == | == Topics == | ||
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: | All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: |
Latest revision as of 14:18, 19 October 2022
Deadlines
|
||
Paper |
|
||
Submission |
|
||
Notification |
|
||
Camera-Ready |
Venue
Amalfi, Italy
Warning: Venue is missing. The map might not show the exact location.
Topics
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
- Anonymity and Privacy
- Applied Cryptography and Implementations
- Authentication, Identification and Access Control
- Block and Stream Ciphers
- Complexity-Theoretic Cryptography
- Cloud Computing Security
- Cryptanalysis
- Cryptocurrencies
- Cryptographic Hash Functions
- Cryptographic and Security Protocols
- Digital Signatures and Message Authentication Codes
- Distributed Systems Security
- Formal Security Methods
- Information-Theoretic Security
- Network, Web and Wireless Security
- Public-Key Encryption
- Physical Cryptography
- Security Architectures and Models
- Software and Systems Security