ACNS 2013 : Applied Cryptography and Network Security

  • Start Date: 06/25/2013
  • End Date: 06/28/2013

Banff, Alberta


The 11th International Conference on Applied Cryptography and Network Security (ACNS 2013) will be held in Banff, Alberta, Canada. The conference seeks submissions from academia, industry, and government presenting novel research on all aspects of applied cryptography as well as network security and privacy. Submissions in emerging areas of security including cloud security, secure infrastructure for big data are highly encouraged. Papers describing novel paradigms, original directions, or non-traditional perspectives are also encouraged. The conference has two tracks: a research track and an industry track. The industrial track will consist of presentations and tutorial sessions, without formal proceedings. Submissions for either track may focus on new visions, industrial challenges, case studies or experimental reports related to implementation or deployment of real-world systems or policies. Tutorials can cover current techniques or best practices in applying cryptography to computer and information systems. Topics of interest include, but are not limited to:

- Access control
- Applied cryptography
- Automated protocols analysis
- Biometric security and privacy
- Complex systems security
- Critical infrastructure protection
- Cryptographic primitives and protocols
- Data protection
- Database and system security
- Digital rights management
- Email and web security
- Identity management
- Intellectual property protection
- Internet fraud
- Intrusion detection and prevention
- Key management
- Malware
- Network security protocols
- Privacy, anonymity, and untraceability
- Privacy-enhancing technology
- Protection for the future Internet
- Secure mobile agents and mobile code
- Security and privacy in cloud and grid systems
- Security and privacy in smart grids
- Security and privacy in wireless networks
- Security and privacy metrics
- Security in distributed systems
- Security in e-commerce
- Security in P2P systems
- Security in pervasive/ubiquitous computing
- Trust management
- Usability and security

Abstracts / Downloads / Reports:
Other Information: 


Submitted papers must not substantially overlap with papers that have already been published, or are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 18 pages for research track and at most 8 pages for industry track, including the bibliography and well-marked appendices, and should follow Springer's LNCS style. Submissions are to be made through the submission web page at Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of February 1, 2013 (11:59 Pacific Time). Authors should indicate whether their submission should be considered for the best student paper award; any paper co-authored by at least a full time student is eligible for this award. At least one author of a accepted paper must attend the conference. Papers accepted for the research track will be published in proceedings published by Springer's LNCS and available at the conference. Extended versions of selected best papers will be invited for a special issue in the Journal of Computer Security.  

Submissions Due: February 1, 2013
Author Notification: April 10, 2013
Camera Ready Due: April 24, 2013



Additional information about the conference can be found at





Final scientific report available here.