Difference between revisions of "SCN 2020"

From Openresearch
Jump to: navigation, search
 
Line 18: Line 18:
 
|Has PC member=Divesh Aggarwal, Elena Andreeva, Gilad Asharov, Saikrishna Badrinarayanan, Manuel Barbosa
 
|Has PC member=Divesh Aggarwal, Elena Andreeva, Gilad Asharov, Saikrishna Badrinarayanan, Manuel Barbosa
 
}}
 
}}
 +
== Topics ==
 +
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:   
 +
*    Anonymity and Privacy
 +
*    Applied Cryptography and Implementations
 +
*    Authentication, Identification and Access Control
 +
*    Block and Stream Ciphers
 +
*    Complexity-Theoretic Cryptography
 +
*    Cloud Computing Security
 +
*    Cryptanalysis
 +
*    Cryptocurrencies
 +
*    Cryptographic Hash Functions
 +
*    Cryptographic and Security Protocols
 +
*    Digital Signatures and Message Authentication Codes
 +
*    Distributed Systems Security
 +
*    Formal Security Methods
 +
*    Information-Theoretic Security
 +
*    Network, Web and Wireless Security
 +
*    Public-Key Encryption
 +
*    Physical Cryptography
 +
*    Security Architectures and Models
 +
*    Software and Systems Security

Latest revision as of 09:13, 17 April 2020

SCN 2020
The Twelfth Conference on Security and Cryptography for Networks
Event in series SCN
Dates 2020/09/14 (iCal) - 2020/09/16
Homepage: https://scn.unisa.it/
Location
Location: Amalfi, Italy
Loading map...

Important dates
Papers: 2020/04/19
Submissions: 2020/04/19
Notification: 2020/06/14
Camera ready due: 2020/06/28
Committees
Organizers: International Association for Cryptologic Research
General chairs: Clemente Galdi
PC chairs: Vladimir Kolesnikov
PC members: Divesh Aggarwal, Elena Andreeva, Gilad Asharov, Saikrishna Badrinarayanan, Manuel Barbosa
Table of Contents

Contents


Topics

All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:

  • Anonymity and Privacy
  • Applied Cryptography and Implementations
  • Authentication, Identification and Access Control
  • Block and Stream Ciphers
  • Complexity-Theoretic Cryptography
  • Cloud Computing Security
  • Cryptanalysis
  • Cryptocurrencies
  • Cryptographic Hash Functions
  • Cryptographic and Security Protocols
  • Digital Signatures and Message Authentication Codes
  • Distributed Systems Security
  • Formal Security Methods
  • Information-Theoretic Security
  • Network, Web and Wireless Security
  • Public-Key Encryption
  • Physical Cryptography
  • Security Architectures and Models
  • Software and Systems Security