The 4th International Conference on 
            Applied Cryptography and Network Security (ACNS'06)

			    June 6-9, 2006

Original papers on all technical aspects of cryptology and network
security are solicited for submission to ACNS'06, the 4th annual
conference on Applied Cryptography and Network Security. There are two
tracks for ACNS: an academic track and an industrial track. The latter
has an emphasis on practical applications. Topics of relevance include
but are not limited to:

Applied cryptography, cryptographic constructions  
Cryptographic applications: payments, fair exchange, time-stamping,
auction, voting, polling
Denial of service: attacks and countermeasures 
Email security, spam prevention 
Fundamental services on network and distributed systems:
  authentication, data integrity, confidentiality, authorization,
  non-repudiation, and availability
Implementation, deployment and management of network security policies 
Integrating security in Internet protocols: routing, naming, TCP/IP,
  multicast, network management
Integrating security services with system and application security
  facilities and protocols: message handling, file transport/access,
  directories, time synchronization, database management, boot services,
  mobile computing
Intellectual property protection: protocols, implementations,
  metering, watermarking, digital rights management
Intrusion avoidance, detection, and response: systems, experiences and
Network perimeter controls: firewalls, packet filters, application gateways 
Public key infrastructure, key management, certification, and revocation 
Securing critical infrastructure: routing protocols, and emergency
  communication Security and privacy for emerging technologies: sensor
  networks, wireless/mobile (and ad hoc) networks, bluetooth, 802.11,
  and p2p systems
Security of limited devices: light-weight cryptography, efficient
  protocols and implementations, and tamper resistance
Security modeling and protocol design in the context of rational and
  malicious adversaries
Security policy construction, management, and systems 
Usable security and deployment incentives for security technology 
Virtual private networks 
Web security and supporting systems security, such as databases,
  operating systems, etc.

Important Dates: 
Submission Deadline:  15 January 2006 
 Camera-ready Copy:  1 April 2006 
Author Notification:  12 March 2006 
 Conference:  June 6-9, 2006 
Instructions for Authors: Submissions must not substantially duplicate
work that any of the authors has published elsewhere or has submitted
in parallel to any other conference or workshop that has
proceedings. There will be two tracks: an academic track and an
industrial track. Submissions to the academic track should emphasize
research advances, while submissions to the industrial track may focus
on implementations of known schemes and deployment
observations. Authors of accepted papers must guarantee that their
paper will be presented at the conference.

Submission Format: The submission must be anonymous, with no author
names, affiliations, acknowledgments, or obvious references. It should
begin with a title, a short abstract, and a list of keywords, in
Portable Document Format (.pdf) with all fonts embedded, at most 15
pages excluding bibliography and appendices. Committee members are not
required to read appendices; the paper should be intelligible without
them. It is strongly preferred that submissions be processed in LaTeX
according to the instructions listed on, since this will be a
mandatory requirement for the final version of papers. Authors are
requested to mark their submissions as "academic track" or "industrial
track". Submissions to the academic track may be considered for the
industrial track (with author permission). Also, authors are requested
to indicate whether submissions are to be considered for the best
student paper; only papers co-authored and presented by a full-time
student are eligible for this award.

Conference Proceedings: Proceedings for the academic track will be
published in Springer-Verlag's Lecture Notes in Computer Science and
will be available at the conference. Clear instructions about the
preparation of a final proceedings version will be sent to the authors
of accepted papers. Proceedings for the industrial track will be
published in a separate volume, not the LNCS. As the proceedings of
the industrial track is informal, papers accepted for the industrial
track can still seek publication elsewhere.