ACNS 2013 : Applied Cryptography and Network Security

  • Start Date: 06/25/2013
  • End Date: 06/28/2013

Banff, Alberta


The 11th International Conference on Applied Cryptography and Network
Security (ACNS 2013) will be held in Banff, Alberta, Canada. The
conference seeks submissions from academia, industry, and government
presenting novel research on all aspects of applied cryptography as well
as network security and privacy. Submissions in emerging areas of
security including cloud security, secure infrastructure for big data
are highly encouraged. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged. The
conference has two tracks: a research track and an industry track. The
industrial track will consist of presentations and tutorial sessions,
without formal proceedings. Submissions for either track may focus on
new visions, industrial challenges, case studies or experimental reports
related to implementation or deployment of real-world systems or
policies. Tutorials can cover current techniques or best practices in
applying cryptography to computer and information systems. Topics of
interest include, but are not limited to:

- Access control- Applied cryptography- Automated protocols analysis- Biometric security and privacy- Complex systems security- Critical infrastructure protection- Cryptographic primitives and protocols- Data protection- Database and system security- Digital rights management- Email and web security- Identity management- Intellectual property protection- Internet fraud- Intrusion detection and prevention- Key management- Malware- Network security protocols- Privacy, anonymity, and untraceability- Privacy-enhancing technology- Protection for the future Internet- Secure mobile agents and mobile code- Security and privacy in cloud and grid systems- Security and privacy in smart grids- Security and privacy in wireless networks- Security and privacy metrics- Security in distributed systems- Security in e-commerce- Security in P2P systems- Security in pervasive/ubiquitous computing- Trust management- Usability and security

Abstracts / Downloads / Reports: 
Other Information: 


SUBMISSION INSTRUCTIONSSubmitted papers must not
substantially overlap with papers that have already been published, or
are simultaneously submitted to a journal or a conference with
proceedings. All submissions should be appropriately anonymized (i.e.,
papers should not contain author names or affiliations, or obvious
citations). Submissions should be at most 18 pages for research track
and at most 8 pages for industry track, including the bibliography and
well-marked appendices, and should follow Springer's LNCS style.
Submissions are to be made through the submission web page at Only pdf files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the deadline
of February 1, 2013 (11:59 Pacific Time). Authors should indicate
whether their submission should be considered for the best student paper
award; any paper co-authored by at least a full time student is
eligible for this award. At least one author of a accepted paper must
attend the conference. Papers accepted for the research track will be
published in proceedings published by Springer's LNCS and available at
the conference. Extended versions of selected best papers will be
invited for a special issue in the Journal of Computer Security.  IMPORTANT DATESSubmissions Due: February 1, 2013Author Notification: April 10, 2013Camera Ready Due: April 24, 2013



Additional information about the conference can be found at