Difference between revisions of "CANS 2021"
Line 20: | Line 20: | ||
}} | }} | ||
==== Areas of Interest ==== | ==== Areas of Interest ==== | ||
− | + | * • Access Control | |
− | • Access Control | + | * • Embedded System Security |
− | • Embedded System Security | + | * • Security in Pervasive Systems |
− | • Security in Pervasive Systems | + | * • Anonymity & Pseudonymity |
− | • Anonymity & Pseudonymity | + | * • Formal Methods for Security |
− | • Formal Methods for Security | + | * • Security in Social Networks |
− | • Security in Social Networks | + | * • Applied Cryptography |
− | • Applied Cryptography | + | * • Hash Functions |
− | • Hash Functions | + | * • Sensor Network Security |
− | • Sensor Network Security | + | * • Attacks & Malicious Code |
− | • Attacks & Malicious Code | + | * • Identity Management |
− | • Identity Management | + | * • Trust Management |
− | • Trust Management | + | * • Authentication & Identification |
− | • Authentication & Identification | + | * • Key Management |
− | • Key Management | + | * • Usable Security |
− | • Usable Security | + | * • Biometrics |
− | • Biometrics | + | * • Language-Based Security |
− | • Language-Based Security | + | * • Virtual Private Networks |
− | • Virtual Private Networks | + | * • Block & Stream Ciphers |
− | • Block & Stream Ciphers | + | * • Malware Analysis and Detection |
− | • Malware Analysis and Detection | + | * • Wireless and Mobile Security |
− | • Wireless and Mobile Security | + | * • Blockchain Security and Privacy |
− | • Blockchain Security and Privacy | + | * • Network Security |
− | • Network Security | + | * • Peer-to-Peer Security & Privacy |
− | • Peer-to-Peer Security & Privacy | + | * • Cryptographic Algorithms and Primitives |
− | • Cryptographic Algorithms and Primitives | + | * • Security and Privacy for Big Data |
− | • Security and Privacy for Big Data | + | * • Privacy-Enhancing Technologies |
− | • Privacy-Enhancing Technologies | + | * • Cryptographic Protocols |
− | • Cryptographic Protocols | + | * • Security and Privacy in the Cloud |
− | • Security and Privacy in the Cloud | + | * • Public Key Cryptography |
− | • Public Key Cryptography | + | * • Cyberphysical Security |
− | • Cyberphysical Security | + | * • Security in Content Delivery |
− | • Security in Content Delivery | + | * • Secure Distributed Computing |
− | • Secure Distributed Computing | + | * • Data and Application Security |
− | • Data and Application Security | + | * • Security in Crowdsourcing |
− | • Security in Crowdsourcing | + | * • Security Architectures |
− | • Security Architectures | + | * • Denial of Service Protection |
− | • Denial of Service Protection | + | * • Security in Grid Computing |
− | • Security in Grid Computing | + | * • Security Metrics |
− | • Security Metrics | + | * • Data Protection |
− | • Data Protection | + | * • Security in the Internet of Things |
− | • Security in the Internet of Things | + | * • Security Models |
− | • Security Models | + | * • Data and Computation Integrity |
− | • Data and Computation Integrity | + | * • Security in Location Services |
− | • Security in Location Services | + | * • Security Policies |
− | • Security Policies |
Latest revision as of 16:40, 11 February 2021
CANS 2021 | |
---|---|
International Conference on Cryptology and Network Security
| |
Ordinal | 20 |
Event in series | CANS |
Dates | 2021/12/13 (iCal) - 2021/12/15 |
Homepage: | https://cans2021.at/ |
Twitter account: | @CansConference |
Submitting link: | https://easychair.org/conferences/?conf=cans2021 |
Location | |
Location: | Vienna, Austria |
Loading map... | |
Important dates | |
Papers: | 2021/06/01 |
Submissions: | 2021/06/01 |
Notification: | 2021/09/01 |
Camera ready due: | 2021/10/01 |
Committees | |
General chairs: | Stephan Krenn |
PC chairs: | Mauro Conti, Marc Stevens |
Table of Contents | |
Contents | |
Tweets by @CansConference | |
Areas of Interest
- • Access Control
- • Embedded System Security
- • Security in Pervasive Systems
- • Anonymity & Pseudonymity
- • Formal Methods for Security
- • Security in Social Networks
- • Applied Cryptography
- • Hash Functions
- • Sensor Network Security
- • Attacks & Malicious Code
- • Identity Management
- • Trust Management
- • Authentication & Identification
- • Key Management
- • Usable Security
- • Biometrics
- • Language-Based Security
- • Virtual Private Networks
- • Block & Stream Ciphers
- • Malware Analysis and Detection
- • Wireless and Mobile Security
- • Blockchain Security and Privacy
- • Network Security
- • Peer-to-Peer Security & Privacy
- • Cryptographic Algorithms and Primitives
- • Security and Privacy for Big Data
- • Privacy-Enhancing Technologies
- • Cryptographic Protocols
- • Security and Privacy in the Cloud
- • Public Key Cryptography
- • Cyberphysical Security
- • Security in Content Delivery
- • Secure Distributed Computing
- • Data and Application Security
- • Security in Crowdsourcing
- • Security Architectures
- • Denial of Service Protection
- • Security in Grid Computing
- • Security Metrics
- • Data Protection
- • Security in the Internet of Things
- • Security Models
- • Data and Computation Integrity
- • Security in Location Services
- • Security Policies
Facts about "CANS 2021"
Acronym | CANS 2021 + |
Camera ready due | October 1, 2021 + |
End date | December 15, 2021 + |
Event in series | CANS + |
Event type | Conference + |
Has Submitting link | https://easychair.org/conferences/?conf=cans2021 + |
Has coordinates | 48° 12' 30", 16° 22' 21"Latitude: 48.208352777778 Longitude: 16.372505555556 + |
Has general chair | Stephan Krenn + |
Has location city | Vienna + |
Has location country | Category:Austria + |
Has program chair | Mauro Conti + and Marc Stevens + |
Has twitter | @CansConference + |
Homepage | https://cans2021.at/ + |
IsA | Event + |
Notification | September 1, 2021 + |
Ordinal | 20 + |
Paper deadline | June 1, 2021 + |
Start date | December 13, 2021 + |
Submission deadline | June 1, 2021 + |
Title | International Conference on Cryptology and Network Security + |