10th International Conference on Applied Cryptography and Network Security (ACNS '12)

June 26-29, 2012, Singapore

Call for Papers


ACNS is an annual research conference focusing on cutting-edge results in applied cryptography and network and computer security.

The 10th International Conference on Applied Cryptography and Network Security (ACNS 2012) will be held in Singapore. The conference seeks submissions from academia, industry, and government presenting novel research on all aspects of applied cryptography as well as network security and privacy. Papers describing novel paradigms, original directions, or non-traditional perspectives are also encouraged. The conference has two tracks: a research track and an industry track. Topics of interest include, but are not limited to:

- Access control - Malware
- Applied cryptography - Network security protocols
- Automated protocols analysis - Privacy, anonymity, and untraceability
- Biometric security and privacy - Privacy-enhancing technology
- Complex systems security - Protection for the future Internet
- Critical infrastructure protection - Secure mobile agents and mobile code
- Cryptographic primitives and protocols - Security in e-commerce
- Database and system security - Security in P2P systems
- Data protection - Security in pervasive/ubiquitous computing
- Digital rights management - Security and privacy in cloud and grid systems
- Email and web security - Security and privacy in distributed systems
- Identity management - Security and privacy in smart grids
- Intellectual property protection - Security and privacy in wireless networks
- Internet fraud - Security and privacy metrics
- Intrusion detection and prevention - Trust management
- Key management - Usability and security

Authors of accepted papers must guarantee that their papers will be presented at the conference. Papers accepted for the research track will be published in proceedings will be published by Springer's LNCS and available at the conference. A best student paper will be awarded and the extended versions of selected best papers will be invited for a special issue on the Journal of Computer Security.