(mobo import Concept___Events-migrated) |
m (Text replacement - "Homepage=" to "Official Website=") |
||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
|Title=The Twelfth Conference on Security and Cryptography for Networks | |Title=The Twelfth Conference on Security and Cryptography for Networks | ||
|Type=Conference | |Type=Conference | ||
− | | | + | |Official Website=https://scn.unisa.it/ |
− | |||
|City=Amalfi | |City=Amalfi | ||
|Country=Country:IT | |Country=Country:IT | ||
− | |||
− | |||
− | |||
|Has coordinator=International Association for Cryptologic Research | |Has coordinator=International Association for Cryptologic Research | ||
|has general chair=Clemente Galdi | |has general chair=Clemente Galdi | ||
Line 24: | Line 20: | ||
|Event Mode=on site | |Event Mode=on site | ||
}} | }} | ||
+ | {{Event Deadline | ||
+ | |Paper Deadline=2020/04/19 | ||
+ | |Notification Deadline=2020/06/14 | ||
+ | |Camera-Ready Deadline=2020/06/28 | ||
+ | |Submission Deadline=2020/04/19 | ||
+ | }} | ||
+ | {{S Event}} | ||
== Topics == | == Topics == | ||
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: | All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: |
Latest revision as of 14:18, 19 October 2022
Deadlines
|
||
Paper |
|
||
Submission |
|
||
Notification |
|
||
Camera-Ready |
Venue
Amalfi, Italy
Warning: Venue is missing. The map might not show the exact location.
Topics
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
- Anonymity and Privacy
- Applied Cryptography and Implementations
- Authentication, Identification and Access Control
- Block and Stream Ciphers
- Complexity-Theoretic Cryptography
- Cloud Computing Security
- Cryptanalysis
- Cryptocurrencies
- Cryptographic Hash Functions
- Cryptographic and Security Protocols
- Digital Signatures and Message Authentication Codes
- Distributed Systems Security
- Formal Security Methods
- Information-Theoretic Security
- Network, Web and Wireless Security
- Public-Key Encryption
- Physical Cryptography
- Security Architectures and Models
- Software and Systems Security