Original papers on all aspects of applied cryptography as well as computer/network security and privacy are solicited. Topics of interest include, but are not limited, to:
- Applied cryptography and cryptographic protocols
- Cryptographic primitives, e.g., cryptosystems, ciphers and hash functions
- Network security protocols
- Privacy, anonymity and untraceability
- Security for the next-generation Internet
- Internet fraud, e.g., phishing, pharming, spam, and click fraud
- Email and web security
- Public key infrastructures, key management, certification & revocation
- Trust and its metrics
- Usable security and cryptography
- Intellectual property protection and digital rights management
- Modeling and protocol design
- Automated protocols analysis
- Secure virtualization and security in cloud computing
- Security and privacy in sensor, mobile, ad hoc and delay-tolerant networks, p2p systems.
- Security and privacy in wireless (e.g., RFID, Bluetooth) communications.
Scope: Papers suggesting novel paradigms, original directions, or non-traditional perspectives are especially welcome. As in previous years, there will be an academic track and an industrial track. Submissions to the former should emphasize research contributions, while submissions to the latter may focus on implementation and deployment of real-world systems. The academic track will have proceedings published as part of the Springer LNCS series and will be available at the conference. The industrial track will only have presentations without formal proceedings.
Submission: Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of meaningful keywords. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. All submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. Submissions not meeting these guidelines will be rejected without review. Authors should indicate whether their submission should be considered for the best student paper award; any paper co-authored by a full-time student is eligible. Authors of accepted papers must guarantee that their paper will be presented at the conference.
Journal: Authors of selected papers will be invited to submit extended versions of their ACNS'11 papers to a Special Issue of the ISI-ranked International Journal of Information Security (IJIS)
- Submission Deadline (Extended): January 24, 2011, midnight PDT
- Author Notification: March 22, 2011
- Camera-Ready Deadline: April 10, 2011