Difference between revisions of "CANS 2021"

From Openresearch
Jump to: navigation, search
(Created page with "{{Event |Acronym=CANS 2021 |Title=International Conference on Cryptology and Network Security |Ordinal=20 |Series=CANS |Type=Conference |Start date=2021/12/13 |End date=2021/1...")
 
 
(3 intermediate revisions by the same user not shown)
Line 9: Line 9:
 
|Submission deadline=2021/06/01
 
|Submission deadline=2021/06/01
 
|Homepage=https://cans2021.at/
 
|Homepage=https://cans2021.at/
 +
|Twitter account=@CansConference
 
|City=Vienna
 
|City=Vienna
 
|Country=Austria
 
|Country=Austria
Line 14: Line 15:
 
|Notification=2021/09/01
 
|Notification=2021/09/01
 
|Camera ready=2021/10/01
 
|Camera ready=2021/10/01
 
+
|Submitting link=https://easychair.org/conferences/?conf=cans2021
 +
|has general chair=Stephan Krenn
 +
|has program chair=Mauro Conti, Marc Stevens
 
}}
 
}}
 +
==== Areas of Interest ====
 +
* • Access Control
 +
* • Embedded System Security
 +
* • Security in Pervasive Systems
 +
* • Anonymity & Pseudonymity
 +
* • Formal Methods for Security
 +
* • Security in Social Networks
 +
* • Applied Cryptography
 +
* • Hash Functions
 +
* • Sensor Network Security
 +
* • Attacks & Malicious Code
 +
* • Identity Management
 +
* • Trust Management
 +
* • Authentication & Identification
 +
* • Key Management
 +
* • Usable Security
 +
* • Biometrics
 +
* • Language-Based Security
 +
* • Virtual Private Networks
 +
* • Block & Stream Ciphers
 +
* • Malware Analysis and Detection
 +
* • Wireless and Mobile Security
 +
* • Blockchain Security and Privacy
 +
* • Network Security
 +
* • Peer-to-Peer Security & Privacy
 +
* • Cryptographic Algorithms and Primitives
 +
* • Security and Privacy for Big Data
 +
* • Privacy-Enhancing Technologies
 +
* • Cryptographic Protocols
 +
* • Security and Privacy in the Cloud
 +
* • Public Key Cryptography
 +
* • Cyberphysical Security
 +
* • Security in Content Delivery
 +
* • Secure Distributed Computing
 +
* • Data and Application Security
 +
* • Security in Crowdsourcing
 +
* • Security Architectures
 +
* • Denial of Service Protection
 +
* • Security in Grid Computing
 +
* • Security Metrics
 +
* • Data Protection
 +
* • Security in the Internet of Things
 +
* • Security Models
 +
* • Data and Computation Integrity
 +
* • Security in Location Services
 +
* • Security Policies

Latest revision as of 16:40, 11 February 2021

CANS 2021
International Conference on Cryptology and Network Security
Ordinal 20
Event in series CANS
Dates 2021/12/13 (iCal) - 2021/12/15
Homepage: https://cans2021.at/
Twitter account: @CansConference
Submitting link: https://easychair.org/conferences/?conf=cans2021
Location
Location: Vienna, Austria
Loading map...

Important dates
Papers: 2021/06/01
Submissions: 2021/06/01
Notification: 2021/09/01
Camera ready due: 2021/10/01
Committees
General chairs: Stephan Krenn
PC chairs: Mauro Conti, Marc Stevens
Table of Contents
Tweets by @CansConference


Areas of Interest

  • • Access Control
  • • Embedded System Security
  • • Security in Pervasive Systems
  • • Anonymity & Pseudonymity
  • • Formal Methods for Security
  • • Security in Social Networks
  • • Applied Cryptography
  • • Hash Functions
  • • Sensor Network Security
  • • Attacks & Malicious Code
  • • Identity Management
  • • Trust Management
  • • Authentication & Identification
  • • Key Management
  • • Usable Security
  • • Biometrics
  • • Language-Based Security
  • • Virtual Private Networks
  • • Block & Stream Ciphers
  • • Malware Analysis and Detection
  • • Wireless and Mobile Security
  • • Blockchain Security and Privacy
  • • Network Security
  • • Peer-to-Peer Security & Privacy
  • • Cryptographic Algorithms and Primitives
  • • Security and Privacy for Big Data
  • • Privacy-Enhancing Technologies
  • • Cryptographic Protocols
  • • Security and Privacy in the Cloud
  • • Public Key Cryptography
  • • Cyberphysical Security
  • • Security in Content Delivery
  • • Secure Distributed Computing
  • • Data and Application Security
  • • Security in Crowdsourcing
  • • Security Architectures
  • • Denial of Service Protection
  • • Security in Grid Computing
  • • Security Metrics
  • • Data Protection
  • • Security in the Internet of Things
  • • Security Models
  • • Data and Computation Integrity
  • • Security in Location Services
  • • Security Policies