Difference between revisions of "SCN 2016"

From Openresearch
Jump to: navigation, search
(Created page with "{{Event |Acronym=SCN 2016 |Title=10th Conference on Security and Cryptography for Networks |Series=SCN |Type=Conference |Start date=2016/08/31 |End date=2016/09/02 |Homepage=h...")
 
 
Line 13: Line 13:
 
|Has PC member=Divesh Aggarwal, Shweta Agrawal, Joël Alwen, Gilad Asharov, Foteini Baldimtsi, Jeremiah Blocki
 
|Has PC member=Divesh Aggarwal, Shweta Agrawal, Joël Alwen, Gilad Asharov, Foteini Baldimtsi, Jeremiah Blocki
 
|has Keynote speaker=Aggelos Kiayias, Rafael Pass
 
|has Keynote speaker=Aggelos Kiayias, Rafael Pass
 +
|Submitted papers=67
 +
|Accepted papers=30
 
}}
 
}}
 
==Topics==
 
==Topics==

Latest revision as of 10:27, 17 April 2020

SCN 2016
10th Conference on Security and Cryptography for Networks
Event in series SCN
Dates 2016/08/31 (iCal) - 2016/09/02
Homepage: http://scn16.di.unisa.it/
Location
Location: Amalfi, Italy
Loading map...

Papers: Submitted 67 / Accepted 30 (44.8 %)
Committees
General chairs: Roberto De Prisco
PC chairs: Vassilis Zikas
PC members: Divesh Aggarwal, Shweta Agrawal, Joël Alwen, Gilad Asharov, Foteini Baldimtsi, Jeremiah Blocki
Keynote speaker: Aggelos Kiayias, Rafael Pass
Table of Contents

Contents

 [hide


Topics

All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:

  • Anonymity and Privacy
  • Applied Cryptography and Implementations
  • Authentication, Identification and Access Control
  • Block and Stream Ciphers
  • Complexity-Theoretic Cryptography
  • Cloud Computing Security
  • Cryptanalysis
  • Cryptocurrencies
  • Cryptographic Hash Functions
  • Cryptographic and Security Protocols
  • Digital Signatures and Message Authentication Codes
  • Distributed Systems Security
  • Formal Security Methods
  • Information-Theoretic Security
  • Network, Web and Wireless Security
  • Public-Key Encryption
  • Physical Cryptography
  • Security Architectures and Models
  • Software and Systems Security