(mobo import Concept___Events-migrated) |
(mobo import Concept___Events-migrated) |
||
Line 4: | Line 4: | ||
|Ordinal=20 | |Ordinal=20 | ||
|Type=Conference | |Type=Conference | ||
− | |||
|Homepage=https://cans2021.at/ | |Homepage=https://cans2021.at/ | ||
|Twitter account=@CansConference | |Twitter account=@CansConference | ||
|City=Vienna | |City=Vienna | ||
|Country=Country:AT | |Country=Country:AT | ||
− | |||
− | |||
− | |||
|Submitting link=https://easychair.org/conferences/?conf=cans2021 | |Submitting link=https://easychair.org/conferences/?conf=cans2021 | ||
|has general chair=Stephan Krenn | |has general chair=Stephan Krenn | ||
Line 26: | Line 22: | ||
|Event Mode=on site | |Event Mode=on site | ||
}} | }} | ||
+ | {{Event Deadline | ||
+ | |Paper Deadline=2021/06/01 | ||
+ | |Notification Deadline=2021/09/01 | ||
+ | |Camera-Ready Deadline=2021/10/01 | ||
+ | |Submission Deadline=2021/06/01 | ||
+ | }} | ||
+ | {{S Event}} | ||
==== Areas of Interest ==== | ==== Areas of Interest ==== | ||
* • Access Control | * • Access Control |
Revision as of 18:52, 22 September 2022
Deadlines
|
||
Paper |
|
||
Submission |
|
||
Notification |
|
||
Camera-Ready |
Venue
Warning: Venue is missing. The map might not show the exact location.
Areas of Interest
- • Access Control
- • Embedded System Security
- • Security in Pervasive Systems
- • Anonymity & Pseudonymity
- • Formal Methods for Security
- • Security in Social Networks
- • Applied Cryptography
- • Hash Functions
- • Sensor Network Security
- • Attacks & Malicious Code
- • Identity Management
- • Trust Management
- • Authentication & Identification
- • Key Management
- • Usable Security
- • Biometrics
- • Language-Based Security
- • Virtual Private Networks
- • Block & Stream Ciphers
- • Malware Analysis and Detection
- • Wireless and Mobile Security
- • Blockchain Security and Privacy
- • Network Security
- • Peer-to-Peer Security & Privacy
- • Cryptographic Algorithms and Primitives
- • Security and Privacy for Big Data
- • Privacy-Enhancing Technologies
- • Cryptographic Protocols
- • Security and Privacy in the Cloud
- • Public Key Cryptography
- • Cyberphysical Security
- • Security in Content Delivery
- • Secure Distributed Computing
- • Data and Application Security
- • Security in Crowdsourcing
- • Security Architectures
- • Denial of Service Protection
- • Security in Grid Computing
- • Security Metrics
- • Data Protection
- • Security in the Internet of Things
- • Security Models
- • Data and Computation Integrity
- • Security in Location Services
- • Security Policies