ACNS 2017,
The 15th International Conference on Applied Cryptography and Network Security,
Kanazawa, Japan, July 10-12, 2017

Submission of papers:        February 3, 2017 (23:59 JST)
Notification of decision:    April 7, 2017
Final version due:        April 17, 2017

The 15th International Conference on Applied Cryptography and Network 
Security (ACNS2017) will be held in Kanazawa, Japan in July 2017. It 
will be organized by Japan Advanced Institute of Science and Technology 
(JAIST) and Osaka University.

ACNS is an annual conference focusing on innovative research and current 
developments that advance the areas of applied cryptography, cyber 
security and privacy. Both academic research works with high relevance 
to real-world problems as well as developments in industrial and 
technical frontiers fall within the scope of the conference.

Submissions may focus on the modelling, design, analysis (including 
security proofs and attacks), development (e.g. implementations), 
deployment (e.g. system integration), and maintenance (including 
performance measurements, usability studies) of algorithms / protocols / 
standards / implementations / technologies / devices / systems, standing 
in close relation with applied cryptography, cyber security and privacy, 
while advancing or bringing new insights to the state of the art. Topics 
of interest include, but are not limited to:
 o  Access control
 o  Applied cryptography
 o  Automated security analysis
 o  Complex systems security
 o  Critical infrastructures
 o  Cryptographic primitives
 o  Cryptographic protocols
 o  Data protection
 o  Database/system security
 o  Digital rights management
 o  Email and web security
 o  Future Internet security
 o  Identity management
 o  IP protection
 o  Internet fraud, cybercrime
 o  Internet-of-Things security
 o  Intrusion detection
 o  Key management
 o  Malware
 o  Mobile/wireless/5G security
 o  Network security protocols
 o  Privacy/anonymity, PETs
 o  Pervasive security
 o  Security in e-commerce
 o  Security in P2P systems
 o  Security in grid systems
 o  Cloud security/privacy
 o  Security/privacy metrics
 o  Trust management
 o  Ubiquitous security/privacy
 o  Human factors in security
 o  Usability in security/privacy

For more information, please see