ACNS 04:   Call for Papers
Applied Cryptography and Network Security

To be held in Yellow Mountain, China, June 8-11 2004.

Proudly sponsored by

ONETS Wireless & Internet Security Tech. Co. Ltd
Ministry of Science and Technology, PRC
ZhuHai JiDa software college
Yellow Mountain City Government

Original research papers on all technical aspects of cryptology are
solicited for submission to ACNS 04, the Second conference of Applied
Cryptography and Network Security. In particular, topics of relevance
include but are not limited to:

- Cryptographic applications: e.g., payments, fair exchange,
time-stamping, auctions, voting, polling, location services.

- Economic incentives for collaboration.

- Security modeling and protocol design in the context of
rational/malicious adversaries.

- Security of limited devices: e.g., adversarial modeling,
light-weight cryptography, efficient protocols and implementations.

- Integrating security in Internet protocols: routing, naming, TCP/IP,
multicast, network management, and the Web.

- Intrusion avoidance, detection, and response: systems, experiences
and architectures.

- Network perimeter controls: firewalls, packet filters, application
gateways.

- Virtual private networks.

- Web security and supporting systems security, such as databases,
operating systems, etc.

- Denial of Service: attacks and countermeasures.

- Securing critical infrastructure: e.g., routing protocols, the power
grid, and emergency communication.

- Public key infrastructure, key management, certification, and
revocation.

- Implementation, deployment and management of network security
policies.

- Intellectual property protection: protocols, implementations,
metering, watermarking, digital rights management.

- Fundamental services on network and distributed systems:
authentication, data integrity, confidentiality, authorization,
non-repudiation, and availability.

- Integrating security services with system and application security
facilities and protocols: e.g., message handling, file
transport/access, directories, time synchronization, database
management, boot services, mobile computing.

- Security and privacy for emerging technologies: sensor networks,
wireless/mobile (and ad hoc) networks, Bluetooth, 802.11, and
peer-to-peer systems.

- Deployment incentives for security technology.

- Web, chat, and email security, including topics such as spam
prevention.

 
Submission deadline
January 28, 2004 (extended from original January 11 date)

Notification of decision
March 5, 2004

Proceedings version deadline
April 1, 2004

Conference
June 8-11, 2004

Instructions for Authors

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
other conference or workshop that has proceedings. Accepted
submissions may not appear in any other conference or workshop that
has proceedings. There will be two tracks; an academic track, and a
technical/industrial track. Submissions to the academic track should
emphasize research advances, while submissions to the
technical/industrial track may focus on implementations of known
schemes and deployment observations.

Submission Format: The submission must be anonymous, with no author
names, affiliations, acknowledgments, or obvious references. It should
begin with a title, a short abstract, and a list of keywords. The
length of the submission should be at most 12 pages excluding
bibliography and appendices. It should use at least 11-point fonts and
have reasonable sized margins. The introduction should summarize the
contributions of the paper at a level appropriate for a non-specialist
reader. Committee members are not required to read appendices; the
paper should be intelligible without them. Submissions not meeting
these guidelines risk rejection without consideration of their
merits. Authors are requested to mark their submissions "academic
track", "technical/industrial track". Submissions to the academic
track may be considered for the technical/industrial track.

Electronic Submission: Electronic submission is strongly
encouraged. Details to be provided.

Hardcopy Submission: Authors unable to submit electronically may, as a
strongly discouraged last resort, send a cover letter and 24
double-sided hardcopies of their submission to the program chair at
the postal address below. Authors intending to submit via hardcopy
should contact the program chair on or before December 31,
2003. Submissions must be received by the program chair on or before
January 11, 2004. Late submissions, regardless of postmark, and
submissions by fax will not be considered. Hardcopy submission must
include a cover letter containing the paper's title and the names and
affiliations of the authors, and should identify the contact author
including e-mail and postal addresses.

Decisions and Presentation: Notification of acceptance or rejection
will be sent to authors by March 5, 2004. Authors of accepted papers
must guarantee that their paper will be presented at the conference.

Conference Proceedings: Proceedings will be published in
Springer-Verlag's Lecture Notes in Computer Science and will be
available at the conference. Clear instructions about the preparation
of a final proceedings version will be sent to the authors of accepted
papers. The final copies of the accepted papers will be due on April
1, 2004.  

Organizers:

General Chair:
Jianying Zhou (i2r, Singapore)

 
Program chairs of the academic track:
Markus Jakobsson (RSA Labs, USA)
Moti Yung (Columbia University, USA)

Program chairs of the technical/industrial track:
Yongfei Han (ONETS, China)
Peter Landrock (Cryptomathic, Denmark)

Organizing Chair:
Xu Li (ONETS, China)

Publicity Chairs:
Michael Szydlo (RSA Labs, USA)
Guilin Wang (i2r, Singapore)

Program Committee (academic track)

Masayuki Abe (NTT, Japan)
N. Asokan (Nokia, Finland)                               
Feng Bao (i2r, Singapore)
Kijon Chae (Ewha Women's Univ., Korea)        
Ed Dawson (QUT, Australia)
Xiaotie Deng (City Univ. of HK, China)              
Philippe Golle (PARC, USA)
Dieter Gollmann (TU Hamburg, Germany)                
Li Gong (Sun Research, China)
Giochiro Hanaoka (Univ. of Tokyo, Japan)
Chi-Sung Laih (NCKU, Taiwan)
Kwok-Yan Lam (Tsinghua Univ., China)
Heejo Lee (AhnLab, Korea) 
Pil Joong Lee (Postech, Korea)                          
Helger Lipmaa (Helsinki Univ. of Tech., Finland)
Javier Lopez (Univ. of Malaga, Spain)
Markus Jakobsson (RSA Labs, USA)
Charanjit Jutla (IBM T.J. Watson, USA)             
Hiroaki Kikuchi (Univ. of Tokai, Japan)
Kwangjo Kim (Info. & Communication Univ., Korea)
Wenbo Mao (HP Labs, UK)
David Naccache (Gemplus, France)                    
Chanathip Namprempre (Thammasat Univ., Thailand)
Phong Nguyen (ENS, France)
Dingyi Pei (Chinese Academy of Science, China)
Adrian Perrig (Carnegie Mellon Univ., USA) 
Josef Pieprzyk (Macquarie University, Australia)
Radha Poovendran (Univ. of Washington, USA)       
Tomas Sander (HP Labs, USA)
Dawn Song (Carnegie Mellon Univ., USA)
Julien Stern (Cryptolog International, France)
Sal Stolfo (Columbia Univ., USA)     
Michael Szydlo (RSA Labs, USA) 
Wen-Guey Tzeng (NCTU, Taiwan)  
Shouhuai Xu (Univ. of Texas at San Antonio, USA) 
Bennet Yee (UCSD,USA)    
Moti Yung (Columbia Univ., USA)
Yuliang Zheng (UNC Chapel Hill, USA)

Stipends: A limited number of stipends are available to those unable
to obtain funding to attend the conference. Students whose papers are
accepted and who will present the paper themselves are encouraged to
apply if such assistance is needed. Requests for stipends should be
addressed to the General Chair.