ACNS 04: Call for Papers Applied Cryptography and Network Security To be held in Yellow Mountain, China, June 8-11 2004. Proudly sponsored by ONETS Wireless & Internet Security Tech. Co. Ltd Ministry of Science and Technology, PRC ZhuHai JiDa software college Yellow Mountain City Government Original research papers on all technical aspects of cryptology are solicited for submission to ACNS 04, the Second conference of Applied Cryptography and Network Security. In particular, topics of relevance include but are not limited to: - Cryptographic applications: e.g., payments, fair exchange, time-stamping, auctions, voting, polling, location services. - Economic incentives for collaboration. - Security modeling and protocol design in the context of rational/malicious adversaries. - Security of limited devices: e.g., adversarial modeling, light-weight cryptography, efficient protocols and implementations. - Integrating security in Internet protocols: routing, naming, TCP/IP, multicast, network management, and the Web. - Intrusion avoidance, detection, and response: systems, experiences and architectures. - Network perimeter controls: firewalls, packet filters, application gateways. - Virtual private networks. - Web security and supporting systems security, such as databases, operating systems, etc. - Denial of Service: attacks and countermeasures. - Securing critical infrastructure: e.g., routing protocols, the power grid, and emergency communication. - Public key infrastructure, key management, certification, and revocation. - Implementation, deployment and management of network security policies. - Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management. - Fundamental services on network and distributed systems: authentication, data integrity, confidentiality, authorization, non-repudiation, and availability. - Integrating security services with system and application security facilities and protocols: e.g., message handling, file transport/access, directories, time synchronization, database management, boot services, mobile computing. - Security and privacy for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, Bluetooth, 802.11, and peer-to-peer systems. - Deployment incentives for security technology. - Web, chat, and email security, including topics such as spam prevention. Submission deadline January 28, 2004 (extended from original January 11 date) Notification of decision March 5, 2004 Proceedings version deadline April 1, 2004 Conference June 8-11, 2004 Instructions for Authors Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. There will be two tracks; an academic track, and a technical/industrial track. Submissions to the academic track should emphasize research advances, while submissions to the technical/industrial track may focus on implementations of known schemes and deployment observations. Submission Format: The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The length of the submission should be at most 12 pages excluding bibliography and appendices. It should use at least 11-point fonts and have reasonable sized margins. The introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Committee members are not required to read appendices; the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors are requested to mark their submissions "academic track", "technical/industrial track". Submissions to the academic track may be considered for the technical/industrial track. Electronic Submission: Electronic submission is strongly encouraged. Details to be provided. Hardcopy Submission: Authors unable to submit electronically may, as a strongly discouraged last resort, send a cover letter and 24 double-sided hardcopies of their submission to the program chair at the postal address below. Authors intending to submit via hardcopy should contact the program chair on or before December 31, 2003. Submissions must be received by the program chair on or before January 11, 2004. Late submissions, regardless of postmark, and submissions by fax will not be considered. Hardcopy submission must include a cover letter containing the paper's title and the names and affiliations of the authors, and should identify the contact author including e-mail and postal addresses. Decisions and Presentation: Notification of acceptance or rejection will be sent to authors by March 5, 2004. Authors of accepted papers must guarantee that their paper will be presented at the conference. Conference Proceedings: Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. The final copies of the accepted papers will be due on April 1, 2004. Organizers: General Chair: Jianying Zhou (i2r, Singapore) Program chairs of the academic track: Markus Jakobsson (RSA Labs, USA) Moti Yung (Columbia University, USA) Program chairs of the technical/industrial track: Yongfei Han (ONETS, China) Peter Landrock (Cryptomathic, Denmark) Organizing Chair: Xu Li (ONETS, China) Publicity Chairs: Michael Szydlo (RSA Labs, USA) Guilin Wang (i2r, Singapore) Program Committee (academic track) Masayuki Abe (NTT, Japan) N. Asokan (Nokia, Finland) Feng Bao (i2r, Singapore) Kijon Chae (Ewha Women's Univ., Korea) Ed Dawson (QUT, Australia) Xiaotie Deng (City Univ. of HK, China) Philippe Golle (PARC, USA) Dieter Gollmann (TU Hamburg, Germany) Li Gong (Sun Research, China) Giochiro Hanaoka (Univ. of Tokyo, Japan) Chi-Sung Laih (NCKU, Taiwan) Kwok-Yan Lam (Tsinghua Univ., China) Heejo Lee (AhnLab, Korea) Pil Joong Lee (Postech, Korea) Helger Lipmaa (Helsinki Univ. of Tech., Finland) Javier Lopez (Univ. of Malaga, Spain) Markus Jakobsson (RSA Labs, USA) Charanjit Jutla (IBM T.J. Watson, USA) Hiroaki Kikuchi (Univ. of Tokai, Japan) Kwangjo Kim (Info. & Communication Univ., Korea) Wenbo Mao (HP Labs, UK) David Naccache (Gemplus, France) Chanathip Namprempre (Thammasat Univ., Thailand) Phong Nguyen (ENS, France) Dingyi Pei (Chinese Academy of Science, China) Adrian Perrig (Carnegie Mellon Univ., USA) Josef Pieprzyk (Macquarie University, Australia) Radha Poovendran (Univ. of Washington, USA) Tomas Sander (HP Labs, USA) Dawn Song (Carnegie Mellon Univ., USA) Julien Stern (Cryptolog International, France) Sal Stolfo (Columbia Univ., USA) Michael Szydlo (RSA Labs, USA) Wen-Guey Tzeng (NCTU, Taiwan) Shouhuai Xu (Univ. of Texas at San Antonio, USA) Bennet Yee (UCSD,USA) Moti Yung (Columbia Univ., USA) Yuliang Zheng (UNC Chapel Hill, USA) Stipends: A limited number of stipends are available to those unable to obtain funding to attend the conference. Students whose papers are accepted and who will present the paper themselves are encouraged to apply if such assistance is needed. Requests for stipends should be addressed to the General Chair.