ACNS 2004: Call for Papers
Yellow Mountain,
Original research papers on all technical aspects of applied cryptography are solicited for submission to ACNS'04, the Second International Conference on Applied Cryptography and Network Security. In particular, topics of relevance include but are not limited to:
Extended submission deadline |
January 28, 2004 |
Notification of decision |
March 28, 2004 |
Proceedings version deadline |
April 7, 2004 |
Conference |
June 8-11, 2004 |
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. There will be two tracks; an academic track, and a technical/industrial track. Submissions to the academic track should emphasize research advances, while submissions to the technical/industrial track may focus on implementations of known schemes and deployment observations.
Submission Format: The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The length of the submission should be at most 12 pages excluding bibliography and appendices. It should use at least 11-point fonts and have reasonable sized margins. The introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Committee members are not required to read appendices; the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors are requested to mark their submissions “academic track”, “technical/industrial track”. Submissions to the academic track may be considered for the technical/industrial track. Also, authors are requested to indicate whether submissions are to be considered for the best student paper; only papers co-authored and presented by a full-time student are eligible for this award.
Electronic Submission: Electronic submission is strongly encouraged. A detailed description of the electronic submission procedure is available at https://www.cosic.esat.kuleuven.ac.be/websubmission/acns2004/
Hardcopy Submission: Authors unable to submit electronically
may, as a strongly discouraged last resort, send a cover letter and 24
double-sided hardcopies of their submission to Moti Yung, Columbia
University, Computer Science Department, 1214
Amsterdam Avenue,
New York, NY 10027,
Decisions and Presentation: Notification of acceptance or rejection will be sent to authors by March 28, 2004. Authors of accepted papers must guarantee that their paper will be presented at the conference.
Conference Proceedings: Proceedings of the academic track
will
be published in Springer-Verlag's Lecture
Notes
in Computer Science and will be available at the conference.
Proceedings
of the technical/industrial track will be published as a special issue
in
the Journal of China Information Security. Clear instructions about the
preparation
of a final proceedings version will be sent to the authors of accepted
papers. The final copies of the accepted papers will be due on April
7, 2004.
General Chair:
Jianying
Zhou (I2R,
Markus Jakobsson (RSA Labs, USA)
Moti Yung
(Columbia University,
Program Chairs Technical/Industrial Track:
Yongfei Han (ONETS, China)
Peter Landrock (Cryptomathic, Denmark)
Organizing Chair:
Xu Li (ONETS,
Publicity Chairs:
Xue
Li (ONETS,
Michael Szydlo (RSA Labs,
Guilin Wang (I2R,
Program Committee
Masayuki Abe (NTT, Japan) | N. Asokan (Nokia, Finland) |
Feng Bao (I2R, |
Kijoon Chae (Ewha Women’s Univ., |
Ed Dawson (QUT, |
Xiaotie Deng (City Univ. of HK, |
Philippe Golle (PARC, USA) | Dieter Gollmann (TU Hamburg, Germany) |
Li Gong (Sun Research, |
Goichiro Hanaoka (Univ. of Tokyo, |
Els van Herreweghen (IBM, Zurich) | Chi-Sung Laih (NCKU, |
Kwok-Yan Lam (Tsinghua Univ., |
Heejo Lee ( |
Pil Joong
Lee (Postech, |
Helger Lipmaa (Helsinki Univ. of Tech., |
Javier Lopez (Univ. of Malaga, |
Markus Jakobsson (RSA Labs, USA) |
Charanjit Jutla (IBM T.J. Watson, USA) | Hiroaki Kikuchi (Univ. of Tokai, Japan) |
Kwangjo Kim (Info. &
Communication
Univ., |
Wenbo Mao (HP Labs, |
David Naccache (Gemplus, |
Chanathip Namprempre (Thammasat
Univ., |
Phong Nguyen (ENS, France) | Dingyi Pei (Chinese Academy of Science, |
Adrian Perrig (Carnegie Mellon Univ., |
Josef Pieprzyk (Macquarie University, |
Radha Poovendran (Univ. of Washington, |
Tomas Sander (HP Labs, USA) |
Dawn Song (Carnegie Mellon Univ., USA) | Julien Stern (Cryptolog International, France) |
Sal Stolfo (Columbia Univ., USA) | Michael Szydlo (RSA Labs, USA) |
Wen-Guey Tzeng (NCTU, Taiwan) | Shouhuai Xu (Univ. of Texas at San Antonio, |
Bennet Yee (Google, |
Moti Yung (Columbia Univ., |
Yuliang Zheng (UNC Charlotte, |
Stipends: A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are encouraged to apply if such assistance is needed. Requests for stipends should be addressed to the General Chair.
Awards: RSA Security sponsors two $500 awards for the academic program, one for the best paper, one for the best student paper.