The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting cutting-edge results from world-renowned scientists in the area.
Building on the success of the past years' conferences, CANS 2016 welcomes poster submissions to be presented during the conference. A poster submission should be a 4 to 6 page abstract, which summarizes the key merits of proposed ideas, presents initial results, and identifies challenges to develop a complete solution. Abstracts will be evaluated by the Posters Session committee based on the novelty and the potential to stimulate discussions and promote collaborations.
Access Control | Network Security | |
Adware, Malware, and Spyware | Peer-to-Peer Security | |
Anonymity & Pseudonymity | Privacy | |
Applied cryptography | Public Key Cryptography | |
Attacks & Malicious Code | Security Architectures | |
Authentication, Identification | Security and Privacy for Big Data | |
Biometrics | Security and Privacy in the Cloud | |
Block & Stream Ciphers | Security in Content Delivery Networks | |
Cryptographic Algorithms | Security in Crowdsourcing | |
Cryptographic Protocols | Security in Grid Computing | |
Cyberphysical Security | Security in the Internet of Things | |
Data and Application Security | Security in Location Services | |
Data and Computation Integrity | Security in Pervasive and Ubiquitous Systems | |
Data Protection | Security in Social Networks | |
Denial of Service Protection | Security Metrics | |
Distributed Systems Security | Security Models | |
Embedded System Security | Security Policies | |
Formal Methods for Security | Sensor Network Security | |
Hash Functions | Spam & SPIT Protection | |
Identity Management | Spyware Analysis and Detection | |
Language-Based Security | Trust Management | |
(Future) Internet Security | Usable Security | |
Key Management | Virtual Private Networks | |
Mobile Security | Wireless and Mobile Security | |
Multicast Security |
The conference will arrange the poster session in a room where the posters can be displayed. Authors interested in posters at the conference should submit a 4 to 6 pages abstract. The abstract of the posters must be submitted only electronically. The electronic submission site is available at: www.easychair.org)
At least one author of every accepted poster must register to the conference by the early registration deadline indicated by the organizers. Authors have to present their own poster. Posters without a registered author will be removed from the proceedings.
The abstract of accepted posters will be published in Springer's Lecture Notes in Computer Science (LNCS) and will be available at the conference. The abstract of the posters should follow the formatting instructions of the Springer LNCS Style, at the time of submission.
Important Dates |
|
Poster Submission due: | September 13, 2016 - 11:59 PM American Samoa time |
Notification to authors: | September 18, 2016 |
Camera ready due: | September 23, 2016 |
General Chair |
|
Pierangela Samarati | Università degli Studi di Milano, Italy |
Program Chairs |
|
Sara Foresti | Università degli Studi di Milano, Italy |
Pino Persiano | Università degli Studi di Salerno, Italy |
Publicity Chair |
|
Giovanni Livraga | Università degli Studi di Milano, Italy |
Poster Chairs |
|
Sara Foresti | Università degli Studi di Milano, Italy |
Pino Persiano | Università degli Studi di Salerno, Italy |
Pierangela Samarati | Università degli Studi di Milano, Italy |
Steering Committee |
|
Yvo Desmedt | University of Texas (Dallas), USA |
Juan A. Garay | Yahoo! Labs, USA |
Amir Herzberg | Bar-Ilan University, Israel |
Yi Mu | University of Wollongong, Australia |
David Pointcheval | CNRS & ENS Paris, France |
Huaxiong Wang | Nanyang Technical University, Singapore |