CfP ACNS 2021 deadline extension

The first round ACNS’21 deadline is extended by 3 days until September 7th AoE due to unexpected outage of the conference website. Submissions can be made via easychair directly at

https://easychair.org/my/login_author?conference=250210

For any questions regarding the submission or the conference, please write to acns2021-contact@googlegroups.com

Detailed formatting instructions are given below in this post.

http://sulab-sever.u-aizu.ac.jp/ACNS2021/index.html (should be reachable again by Sept 7)

Important Dates:

  • First Submission Deadline 7 Sept 2020 AoE (Anytime on Earth)
  • First Submission Notification 9 Nov 2020
  • Second Submission Deadline 15 Jan 2021 AoE (Anytime on Earth)
  • Second Submission Notification 22 Mar 2021
  • Conference Date 21-24 June 2021

Submissions are double-blind, LNCS format 20+10 pages. Papers rejected at the first round can be submitted at the second round, together with a response letter addressing the reviewer’s points.

Conference Topics

Areas of interest for ACNS 2021 include but are not limited to:

  • Access control
  • Applied cryptography
  • Automated security analysis
  • Biometric security/privacy
  • Blockchain and cryptocurrencies
  • Cloud security/privacy
  • Complex systems security
  • Critical infrastructure security
  • Cryptographic primitives
  • Cryptographic protocols
  • Data protection
  • Database/system security
  • Digital rights management
  • Email, app and web security
  • Future Internet security
  • Human factors in security
  • Identity management
  • IP protection
  • Internet fraud, cybercrime
  • Internet-of-Things (IoT) security
  • Intrusion detection
  • Key management
  • Malware
  • Mobile/wireless/5G security
  • Network security protocols
  • Privacy/anonymity, PETs
  • Security/privacy metrics
  • Side channel attacks (e.g., microarchitectural, physical-layer)
  • Trust management
  • Ubiquitous security/privacy
  • Usable security/privacy

Submission Instructions

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references. Each submission must begin with a title and short abstract. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see http://www.springeronline.com/lncs​ ) with a page limit of 20 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Papers should be submitted electronically in PDF format. Papers rejected at the first round can be submitted at the second round (together with a response letter). Submissions not meeting the submission guidelines risk rejection without consideration of their merits. We encourage submissions in LaTeX. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Note that the page limit for camera-ready version is 20 pages with up to 10 additional pages of Appendix.

Conflicts of Interests

We use the following definition on conflicts of Interest, based on Usenix Security’20: The program co-chairs require cooperation from both authors and program committee members to prevent submissions from being evaluated by reviewers who have a conflict of interest. During the submission process, we will ask authors to identify members of the program committee with whom they share a conflict of interest. This includes: (1) anyone who shares an institutional affiliation with an author at the time of submission, (2) anyone who was the advisor or advisee of an author at any time in the past, (3) anyone the author has collaborated or published with in the prior two years, (4) anyone who is serving as the sponsor or administrator of a grant that funds your research, or (5) close personal friendships. For other forms of conflict, authors must contact the chairs and explain the perceived conflict. Program committee members who are in conflict of interest with a paper, including program co-chairs, will be excluded from evaluation and discussion of the paper by default.

Organizing Committee

General Co-Chairs

  • Chunhua Su, University of Aizu, Japan
  • Kauzma Omote, University of Tsukuba, Japan

Program Co-Chairs

  • Kazue Sako, Waseda University, Japan
  • Nils Ole Tippenhauer, CISPA, Germany

Publicity Chair

Keita Emura, NICT, Japan

Workshop Chair

Jianying Zhou, Singapore University of Technology and Design, Singapore

Poster Chair

Masaki Shimaoka, University of Tsukuba/SECOM CO., LTD., Japan

Program Committee

  • Mitsuaki Akiyama, NTT, Japan
  • Cristina Alcaraz, University of Malaga, Spain
  • Man Ho Au, The Hong Kong Polytechnic University, Hong Kong
  • Lejla Batina, Radboud Universiteit, Netherlands
  • Alex Biryukov, University of Luxembourg, Luxembourg
  • Alexandra Boldyreva, Georgia Tech, USA
  • Ferdinand Brasser, TU Darmstadt, Germany
  • Chris Brzuska, Aalto University, Finland
  • Alvaro Cardenas, University of California at Santa Clara, USA
  • Sudipta Chattopadhyay, SUTD, Singapore
  • Xiaofeng Chen, Xidian University, China
  • Liqun Chen, University of Surrey, UK
  • Jiska Classen, TU Darmstadt, Germany
  • Hervé Debar, Télécom SudParis, France
  • Stéphanie Delaune, IRISA, France
  • Christian Doerr, TU Delft, Netherlands
  • Nico Döttling, CISPA, Germany
  • F. Betül Durak, Robert Bosch LLC, USA
  • Karim Eldefrawy, SRI International, USA
  • Zekeriya Erkin, TU Delft, Netherlands
  • Olga Gadyatskaya, Leiden University, Netherlands
  • Joaquin Garcia-Alfaro, Telecom SudParis, France
  • Paolo Gasti, New York Institute of Technology, USA
  • Dieter Gollmann, TUHH, Germany
  • Stefanos Gritzalis, University of the Aegean, Greece
  • Xinyi Huang, Fujian Normal University, China
  • Antoine Joux, Sorbonne, France & CISPA, Germany
  • Ghassan Karame, NEC Laboratories Europe, Germany
  • Stefan Katzenbeisser, Darmstadt, Germany
  • Hiroaki Kikuchi, Meiji University, Japan
  • Qi Li, Tsinghua University, China
  • Zhiqiang Lin, Ohio State University, USA
  • Joseph Liu, Monash University, Australia
  • Xiapu Luo, Hong Kong Polytechnic University, Hong Kong
  • Emil Lupu, Imperial College, UK
  • Di Ma, University of Michigan, USA
  • Mark Manulis, University of Surrey, UK
  • Takahiro Matsuda, AIST, Japan
  • Sjouke Mauw, University of Luxembourg, Luxembourg
  • Catherine Meadows, Naval Research Laboratory, USA
  • Nele Mentens, KU Leuven, Belgium
  • Veelasha Moonsamy, Radboud University, Netherlands
  • Satoshi Obana, Hosei University, Japan
  • Martín Ochoa,Cyxtera Technologies, Colombia
  • Wakaha Ogata, Tokyo Institute of Technology, Japan
  • Miyako Okubo, NICT, Japan
  • Roberto Di Pietro, HBKU, Qatar
  • Christina Pöpper, New York University Abu Dhabi, UAE
  • Aanjhan Ranganathan, Northeastern University, USA
  • Joel Reardon, University of Calgary, Canada
  • Ruben Rios, University of Malaga, Spain
  • Sushmita Ruj, ISI Kolkata, India
  • Mark Ryan, University of Birmingham, UK
  • Rei Safavi-Naini, University of Calgary, Canada
  • Kazue Sako (co-chair), Waseda University, Japan
  • Steve Schneider, University of Surrey, UK
  • Sooel Son, KAIST, Korea
  • Hung-Min Sun, National Tsing Hua University, Taiwan
  • Willy Susilo, University of Wollongong, Australia
  • Pawel Szalachowski, SUTD, Singapore
  • Qiang Tang, New Jersey Institute of Technology, USA
  • Nils Ole Tippenhauer (co-chair), CISPA, Germany
  • Selcuk Uluagac, FIU, USA
  • Edgar Weippl, Vienna University of Technology, Austria
  • Christian Wressnegger, KIT, Germany
  • Kehuan Zhang, Chinese University of Hong Kong, Hong Kong
Nils Ole Tippenhauer
Nils Ole Tippenhauer
Faculty

I am interested in information security aspects of practical systems. In particular, I am currently working on security of industrial control systems and the Industrial Internet of Things.

Related