The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting cutting-edge results from world-renowned scientists in the area. Proceedings of CANS are published in the Lecture Notes in Computer Science series of Springer. They are distributed at the conference and are included in all major online databases.
The 15th edition of the conference will be held in Milan, Italy on November 14-16, 2016. Earlier editions of CANS were held in Taipei (2001), San Francisco (2002), Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), Hong Kong (2008), Kanazawa (2009), Kuala Lumpur (2010), Sanya (2011), Darmstadt (2012), Parary (2013), Crete (2014), and Marrakesh (2015). CANS 2016 is held in cooperation with the International Association of Cryptologic Research (IACR).
The proceedings of CANS 2016 are available here.
Papers offering novel research contributions are solicited for submission to the 15th International Conference on Cryptology and Network Security (CANS 2016). The focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers suggesting novel paradigms, original directions, or non-traditional perspectives.
Submitted papers must not substantially overlap with papers that have been published or that are submitted in parallel to a journal or a conference with formally published proceedings.
Access Control | Network Security | |
Adware, Malware, and Spyware | Peer-to-Peer Security | |
Anonymity & Pseudonymity | Privacy | |
Applied cryptography | Public Key Cryptography | |
Attacks & Malicious Code | Security Architectures | |
Authentication, Identification | Security and Privacy for Big Data | |
Biometrics | Security and Privacy in the Cloud | |
Block & Stream Ciphers | Security in Content Delivery Networks | |
Cryptographic Algorithms | Security in Crowdsourcing | |
Cryptographic Protocols | Security in Grid Computing | |
Cyberphysical Security | Security in the Internet of Things | |
Data and Application Security | Security in Location Services | |
Data and Computation Integrity | Security in Pervasive and Ubiquitous Systems | |
Data Protection | Security in Social Networks | |
Denial of Service Protection | Security Metrics | |
Distributed Systems Security | Security Models | |
Embedded System Security | Security Policies | |
Formal Methods for Security | Sensor Network Security | |
Hash Functions | Spam & SPIT Protection | |
Identity Management | Spyware Analysis and Detection | |
Language-Based Security | Trust Management | |
(Future) Internet Security | Usable Security | |
Key Management | Virtual Private Networks | |
Mobile Security | Wireless and Mobile Security | |
Multicast Security |