ACNS 2005
Applied Cryptography and Network Security 2005

Columbia University, New York City, New York, USA
June 7-10, 2005

Submission Deadline:
26 January 2005 (tentative)


Original research papers on all technical aspects of cryptology are
solicited for submission to ACNS '05, the Third annual conference on
Applied Cryptography and Network Security. There are two tracks for
ACNS: a research track and an industrial track. The latter has an
emphasis on practical applications. In addition, submissions to the
industrial track may be talk proposals (rather than full papers). The
PC will consider moving submissions between tracks if the PC feels
that a submission is more appropriate for that track (with author
permission). Topics of relevance include but are not limited to:

    * Applied Cryptography, cryptographic constructions
    * Cryptographic applications: e.g., payments, fair exchange,
      time-stamping, auctions, voting, polling, location services.
    * Economic incentives for collaboration
    * Security modeling and protocol design in the context of rational
      and malicious adversaries
    * Security of limited devices: e.g., adversarial modeling,
      light-weight cryptography, efficient protocols and implementations.
    * Integrating security in Internet protocols: routing, naming,
      TCP/IP, multicast, network management, and the Web.
    * Intrusion avoidance, detection, and response: systems,
      experiences and architectures.
    * Network perimeter controls: firewalls, packet filters,
      application gateways.
    * Virtual private networks.
    * Web security and supporting systems security, such as databases,
      operating systems, etc.
    * Denial of Service: attacks and countermeasures.
    * Securing critical infrastructure: e.g., routing protocols, the
      power grid, and emergency communication.
    * Public key infrastructure, key management, certification, and revocation.
    * Implementation, deployment and management of network security policies.
    * Intellectual property protection: protocols, implementations,
      metering, watermarking, digital rights management.
    * Fundamental services on network and distributed systems:
      authentication, data integrity, confidentiality, authorization,
      non-repudiation, and availability.
    * Integrating security services with system and application
      security facilities and protocols: e.g., message handling, file
      transport/access, directories, time synchronization, database
      management, boot services, mobile computing.
    * Security and privacy for emerging technologies: sensor networks,
      wireless/mobile (and ad hoc) networks, Bluetooth, 802.11, and
      peer-to-peer systems.
    * Usable security.
    * Deployment incentives for security technology.
    * Web, chat, and email security, including topics such as spam prevention.

Important Dates

Submission Deadline: 26 January 2005 (tentative)
Author Notification Date: 1 April 2005 (tentative)
Camera-ready copy due: 15 April 2005 (tentative)
Conference: June 7-10, 2005
Program Committee

    * Scott Alexander (Telcordia, USA)
    * Tuomas Aura (Microsoft Research, UK)
    * David Brumley (CMU, USA)
    * Ran Canetti (IBM Research, USA)
    * Marc Dacier (Eurecom, France)
    * Ed Dawson (Queensland U. of Technology, Australia)
    * Glenn Durfee (PARC, USA)
    * Virgil Gligor (U. of Maryland, USA)
    * Peter Gutman (U. of Auckland, New Zealand)
    * Goichiro Hanaoka (U. of Tokyo, Japan)
    * Amir Herzberg (Bar Ilan U., Israel)
    * Russ Housley (Vigilsec, USA)
    * John Ioannidis (Columbia U., USA)
    * Sotiris Ioannidis (U. of Pennsylvania, USA)
    * Stas Jarecki (UC Irvine, USA)
    * Ari Juels (RSA Laboratories, USA)
    * Angelos Keromytis (Columbia U., USA)
    * Aggelos Kiayias (U. Connecticut, USA)
    * Tanja Lange (U. Bochum, Germany)
    * Dong Hoon Lee (Korea U., South Korea)
    * Fabio Massacci (U. Trento, Italy)
    * Atsuko Miyaji (JAIST, Japan)
    * Frederic Muller (DCSSI Crypto Lab, France)
    * Kaisa Nyberg (Nokia, Finland)
    * Bart Preneel (K.U. Leuven, Belgium)
    * Vassilis Prevelakis (Drexel U., USA)
    * Niels Provos (Google, USA)
    * Pierangela Samarati (U. of Milan, Italy)
    * Tomas Sander (HP, USA)
    * Dan Simon (Microsoft Research, USA)
    * Tsuyoshi Takagi (T.U. Darmstadt, Germany)
    * Wen-Guey Tzeng (NCTU, Taiwan)
    * Dan Wallach (Rice U., USA)
    * Susanne Wetzel (Stevens, USA)
    * Moti Yung (Columbia U., USA)
    * Jianying Zhou (I2R, Singapore)
    * Lidong Zhou (Microsoft Research, USA)

Conference Organizers

    * John Ioannidis (General Chair)
    * Angelos Keromytis (PC Co-Chair)
    * Moti Yung (PC Co-Chair)

Author Instructions

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
other conference or workshop that has proceedings. Accepted
submissions may not appear in any other conference or workshop that
has proceedings. There will be two tracks; an academic track, and a
technical/industrial track.

Submissions to the academic track should emphasize research advances,
while submissions to the technical/industrial track may focus on
implementations of known schemes and deployment observations.

Submission Format

The submission must be anonymous, with no author names, affiliations,
acknowledgments, or obvious references. It should begin with a title,
a short abstract, and a list of keywords. The length of the submission
should be at most 12 pages excluding bibliography and appendices. It
should use at least 11-point fonts and have reasonable sized margins.

The introduction should summarize the contributions of the paper at a
level appropriate for a non-specialist reader. Committee members are
not required to read appendices; the paper should be intelligible
without them. Submissions not meeting these guidelines risk rejection
without further consideration of their merits. Authors are requested
to mark their submissions as "academic track" or "technical/industrial

Submissions to the academic track may be considered for the
technical/industrial track. Also, authors are requested to indicate
whether submissions are to be considered for the best student paper;
only papers co-authored and presented by a full-time student are
eligible for this award.

Authors of accepted papers must guarantee that their paper will be
presented at the conference.

Conference Proceedings

Proceedings will be published in Springer-Verlag's Lecture Notes in
Computer Science and will be available at the conference. Clear
instructions about the preparation of a final proceedings version will
be sent to the authors of accepted papers. Proceedings for the
industrial track will be published in a separate volume, not the LCNS.