Aim/Scope/Research Area
|
Original papers on all aspects of applied cryptography and network security are solicited for submission to ACNS '10. Topics of relevance include but are not limited to: Applied cryptography and provably-secure cryptographic protocols Design and analysis of efficient cryptographic primitives: public-key and symmetric-key cryptosystems, block ciphers, and hash functions Network security protocols Techniques for anonymity; trade-offs between anonymity and utility Integrating security into the next-generation Internet: DNS security, routing, naming, denial-of-service attacks, TCP/IP, secure multicast Economic fraud on the Internet: phishing, pharming, spam, and click fraud Email and web security Public key infrastructure, key management, certification, and revocation Security and privacy for emerging technologies: sensor networks, mobile (ad hoc) networks, peer-to-peer networks, bluetooth, 802.11, RFID Trust metrics and robust trust inference in distributed systems Security and usability Intellectual property protection and digital rights management Modeling and protocol design for rational and malicious adversaries Automated analysis of protocols Papers suggesting novel paradigms, original directions, or non-traditional perspectives are especially welcome.
As in previous years, there will be an academic track and an industrial track. Submissions to the academic track should emphasize research contributions, while submissions to the industrial track may focus on implementation and deployment of real-world systems. Please indicate in the title for submissions to the industrial track. The academic track will have proceedings published in Springer's LNCS and will be available at the conference. The industrial track will only have presentations without formal proceedings.
|