ACNS 2005 Call for Papers

A 1 page PDF version of the Call for Papers is available.

Location:
Columbia University, New York City, New York, USA
Date:
June 7-10, 2005
Submission Deadline:
2 February 2005 23:59:59 EST
Contact:
acns2005chairsKEEP.IF.SPAM ATcsDOTcolumbiaDOTedu

Topics

Original research papers on all technical aspects of cryptology are solicited for submission to ACNS '05, the Third annual conference on Applied Cryptography and Network Security. There are two tracks for ACNS: a research track and an industrial track. The latter has an emphasis on practical applications. In addition, submissions to the industrial track may be talk proposals (rather than full papers). The PC will consider moving submissions between tracks if the PC feels that a submission is more appropriate for that track (with author permission). Topics of relevance include but are not limited to:

  • Applied Cryptography, cryptographic constructions
  • Cryptographic applications: e.g., payments, fair exchange, time-stamping, auctions, voting, polling, location services.
  • Economic incentives for collaboration
  • Security modeling and protocol design in the context of rational and malicious adversaries
  • Security of limited devices: e.g., adversarial modeling, light-weight cryptography, efficient protocols and implementations.
  • Integrating security in Internet protocols: routing, naming, TCP/IP, multicast, network management, and the Web.
  • Intrusion avoidance, detection, and response: systems, experiences and architectures.
  • Network perimeter controls: firewalls, packet filters, application gateways.
  • Virtual private networks.
  • Web security and supporting systems security, such as databases, operating systems, etc.
  • Denial of Service: attacks and countermeasures.
  • Securing critical infrastructure: e.g., routing protocols, the power grid, and emergency communication.
  • Public key infrastructure, key management, certification, and revocation.
  • Implementation, deployment and management of network security policies.
  • Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management.
  • Fundamental services on network and distributed systems: authentication, data integrity, confidentiality, authorization, non-repudiation, and availability.
  • Integrating security services with system and application security facilities and protocols: e.g., message handling, file transport/access, directories, time synchronization, database management, boot services, mobile computing.
  • Security and privacy for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, Bluetooth, 802.11, and peer-to-peer systems.
  • Usable security.
  • Deployment incentives for security technology.
  • Web, chat, and email security, including topics such as spam prevention.

Important Dates

Submission Deadline: 2 February 2005
Author Notification Date: 4 April 2005
Camera-ready copy due: 15 April 2005
Conference: June 7-10, 2005

Program Committee

  • Scott Alexander (Telcordia, USA)
  • Tuomas Aura (Microsoft Research, UK)
  • David Brumley (CMU, USA)
  • Ran Canetti (IBM Research, USA)
  • Marc Dacier (Eurecom, France)
  • Ed Dawson (Queensland U. of Technology, Australia)
  • Glenn Durfee (PARC, USA)
  • Virgil Gligor (U. of Maryland, USA)
  • Peter Gutman (U. of Auckland, New Zealand)
  • Goichiro Hanaoka (National Institute of Advanced Industrial Science and Technology (AIST), Japan)
  • Amir Herzberg (Bar Ilan U., Israel)
  • Russ Housley (Vigilsec, USA)
  • John Ioannidis (Columbia U., USA)
  • Sotiris Ioannidis (U. of Pennsylvania, USA)
  • Stas Jarecki (UC Irvine, USA)
  • Ari Juels (RSA Laboratories, USA)
  • Angelos Keromytis (Columbia U., USA)
  • Aggelos Kiayias (U. Connecticut, USA)
  • Tanja Lange (U. Bochum, Germany)
  • Dong Hoon Lee (Korea U., South Korea)
  • Fabio Massacci (U. Trento, Italy)
  • Atsuko Miyaji (JAIST, Japan)
  • Frederic Muller (DCSSI Crypto Lab, France)
  • Kaisa Nyberg (Nokia, Finland)
  • Bart Preneel (K.U. Leuven, Belgium)
  • Vassilis Prevelakis (Drexel U., USA)
  • Niels Provos (Google, USA)
  • Pierangela Samarati (U. of Milan, Italy)
  • Tomas Sander (HP, USA)
  • Dan Simon (Microsoft Research, USA)
  • Tsuyoshi Takagi (T.U. Darmstadt, Germany)
  • Wen-Guey Tzeng (NCTU, Taiwan)
  • Dan Wallach (Rice U., USA)
  • Susanne Wetzel (Stevens, USA)
  • Moti Yung (Columbia U., USA)
  • Jianying Zhou (I2R, Singapore)
  • Lidong Zhou (Microsoft Research, USA)

Author Instructions

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. There will be two tracks; an academic track, and a technical/industrial track.

Submissions to the academic track should emphasize research advances, while submissions to the technical/industrial track may focus on implementations of known schemes and deployment observations.

Submission Format

The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The length of the submission should be at most 12 pages excluding bibliography and appendices. It should use at least 11-point fonts and have reasonable sized margins.

The introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Committee members are not required to read appendices; the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without further consideration of their merits. Authors are requested to mark their submissions as "academic track" or "technical/industrial track".

Submissions to the academic track may be considered for the technical/industrial track. Also, authors are requested to indicate whether submissions are to be considered for the best student paper; only papers co-authored and presented by a full-time student are eligible for this award.

Authors of accepted papers must guarantee that their paper will be presented at the conference.

Conference Proceedings

Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. Proceedings for the industrial track will be published in a separate volume, not the LCNS.