CANS 2019

The 18th International Conference on Cryptology and Network Security
Fuzhou, China
25-27 October 2019
---In Cooperation with IACR---

About CANS 2019

The International Conference on Cryptology And Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting cutting-edge results from world-renowned scientists in the area. CANS 2019 will be held in Fuzhou (China) in collaboration with the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University. Earlier editions were held in Taipei ('01), San Francisco ('02), Miami ('03), Xiamen ('05), Suzhou ('06), Singapore ('07), Hong Kong ('08), Kanazawa ('09), Kuala Lumpur ('10), Sanya ('11), Darmstadt ('12), Parary ('13), Crete ('14), Marrakesh ('15), Milan ('16), Hong Kong ('17) and Naples ('18). All accepted papers will be presented at the conference and will appear in the conference proceedings, which will be published by Springer in the LNCS series.

Important Dates

Paper Submission Due: 6 May 2019 UTC Extended to 3 June 2019, 23:59 UTC
Authors Notification: 8 July 2019 UTC Extended to 31 July 2019 UTCC
Camera ready due: 5 August 2019, 23:59 UTC Extended to 10 August 2019, 23:59 UTC
Conference Dates: 25-27 October 2019

TBA

TBA

Important Dates

Paper Submission Due: 6 May 2019 UTC Extended to 3 June 2019, 23:59 UTC
Authors Notification: 8 July 2019 UTC Extended to 31 July 2019 UTCC
Camera ready due: 5 August 2019, 23:59 UTC Extended to 10 August 2019, 23:59 UTC
Conference Dates: 25-27 October 2019

The annual International Conference on Cryptology and Network Security (CANS) focuses on current advances in all aspects of cryptology, data protection, and network and computer security. The proceedings will be published in the Lecture Notes in Computer Science series by Springer.

Submission guidelines

High quality papers on unpublished research and implementation experiences are solicited for submission. All papers must be original and not substantially duplicate work that has been published at or is simultaneously submitted to a journal or another conference/workshop with proceedings. All submissions must be written in English, at most 20 pages in Springer's Lecture Notes in Computer Science (LNCS) Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. The introduction should summarise the contributions of the paper at the level understandable for a non-expert reader. The introduction should also explain the relation to related work. At most 4 pages of supplemental material may be provided as well-marked appendices, however, the paper should be intelligible without this material. Submissions must be anonymous (no author names, affiliations, acknowledgments, or obvious references). The conference will also consider short papers, that is, submissions of up to 8 pages (in the LNCS format), for results that are not yet fully fleshed out or that simply require few pages to describe but still make a significant contribution. All submissions must be processed with LaTeX2e according to the instructions given by Springer. Submitted manuscripts must be typeset in plain Springer LNCS format, in particular without changing the font size, margins or line spacing. Submissions not meeting these guidelines may be rejected without consideration of their merits. Papers must be submitted electronically in PDF format via easychair.

https://easychair.org/conferences/?conf=cans2019

Presentation and publication

At least one author of every accepted paper must register to the conference by the early registration deadline indicated by the organizers. Papers without a registered author will be removed from the proceedings. Authors have to present their own paper(s). Proceedings including all accepted papers will be published in LNCS and will be available at the conference.

Areas of interest

• Access Control
• Anonymity & Pseudonymity
• Applied Cryptography
• Attacks & Malicious Code
• Authentication, Identification
• Biometrics
• Block & Stream Ciphers
• Blockchain Security and Privacy
• Cryptographic Algorithms and Primitivess
• Cryptographic Protocols
• Cyberphysical Security
• Data and Application Security
• Data and Computation Integrity
• Data Protection
• Denial of Service Protection
• Embedded System Security
• Formal Methods for Security
• Hash Functions
• Identity Management
• Key Management
• Language-Based Security
• Malware Analysis and Detection
• Network Security

• Security and Privacy for Big Data
• Security and Privacy in the Cloud
• Security in Content Delivery
• Security in Crowdsourcing
• Security in Grid Computing
• Security in the Internet of Things
• Security in Location Services
• Security in Pervasive Systems
• Security in Social Networks
• Sensor Network Security
• Trust Management
• Usable Security
• Virtual Private Networks
• Wireless and Mobile Security
• Peer-to-Peer Security & Privacy
• Privacy-Enhancing Technologies
• Public Key Cryptography
• Secure Distributed Computing
• Security Architectures
• Security Metrics
• Security Models
• Security Policies

Journal Special Issues

Selected quality papers will be invited for publicaction in two joural special issues. The detail informaiton will be provided after confirmed by the publishers.

PDF version of CFP: click download file

TBA

TBA

Program Co-Chairs

Robert H. Deng, SMU, Singapore
Yi Mu, Fujian Normal University, China

General Chair

Changping Wang, Fujian Normal University, China

Local and Organising Committee

Xinyi Huang, Fujian Normal University, China
Li Xu, Fujian Normal University, China

Publicity Chair

Wei Wu, Fujian Normal University, China
Shangpeng Wang, Fujian Normal University, China

Web Chair

Hong Zhao, Fujian Normal University, China

Steering Committee

Yvo Desmedt, University of Texas at Dallas, USA
Juan A. Garay, Yahoo! Labs, USA
Amir Herzberg, Bar-Ilan University, Israel
Yi Mu, Fujian Normal University, China
David Pointcheval, CNRS and ENS Paris, France
Huaxiong Wang, Nanyang Technological University, Singapore

Program Committee

Masayuki Abe, NTT, Japan
Man Ho Au, Hong Kong Polytechnic University, China
Reza Azarderakhsh, Florida Atlantic University, USA
Elisa Bertino, Purdue University, USA
Erik-Oliver Blass, Airbus Group Innovations, France
Zhenfu Cao, East China Normal University, China
Aniello Castiglione, University of Naples Parthenope, Italy
Rongmao Chen, National University of Defense Technology, China
Sherman S. M. Chow, Chinese University of Hong Kong, China
Xuhua Ding, Singapore Management University, Singapore
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Pooya Farshim, ENS, France
Chaya Ganesh, Aarhus University, Denmark
Peter Gaži, IST Austria, Austria
Dieter Gollmann, Hamburg University of Technology, Germany
Dawu Gu, Shanghai Jiao Tong University, China
Fuchun Guo, University of Wollongong, Australia
Amir Herzberg, Dept. of Computer Science, Bar Ilan University, Israel
Julia Hesse, ENS & CNRS, France
Sotiris Ioannidis, FORTH, Greece
Frank Kargl, University of Ulm, Germany
Kaoru Kurosawa, Ibaraki University, Japan
Yingjiu Li, Singapore Management University, Singapore
Dongdai Lin, Institute of Information Engineering, CAS, China
Zhe Liu, University of Luxembourg, Luxembourg
Joseph Liu, Monash University, Australia
Peng Liu, The Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Di Ma, University of Michigan, USA
Mark Manulis, University of Surrey, UK
Evangelos Markatos, ICS/FORTH, Greece
Chris Michell, Royal Holloway, University of London, UK
Chandrasekaran Pandurangan, Indian Institute of Technology, Madras, India
Stefano Paraboschi, Università di Bergamo, Italy
Pierangela Samarati, University of Milan, Italy
Dominique Schroeder, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Luisa Siniscalchi, University of Salerno, Italy
Willy Susilo, University of Wollongong, Australia
George Theodorakopoulos, Cardiff University, UK
Vijay Varadharajan, New Castle University, Australia
Frederik Vercauteren, K.U.Leuven - ESAT/COSIC, Belgium
Cong Wang, City University of Hong Kong, China
Huaxiong Wang, Nanyang Technological University, Singapore
Qian Wang, Wuhan University, China
Ding Wang, Peking University, China
Lei Wang, Shanghai Jiao Tong University, China
Jian Weng, Jinan University, China
Min Yang, Fudan University, China
Yu Yu, Shanghai Jiao Tong University, China

TBA