14th International Conference on Cryptology and Network Security (CANS 2015)
Le Méridien N'Fis Hotel
Marrakesh, Morrocco -- 8-10 December 2015

The International Conference on Cryptology and Network Security (CANS) 
is an annual conference focusing on all aspects of cryptology and 
network security, attracting cutting-edge results from world-renowned 
scientists in the area. Proceedings of CANS are published in Springer's 
Lecture Notes in Computer Science series.  They are distributed at the 
conference and are included in all major online databases.

The 14th edition of the conference will be held in Marrakesh, Morrocco, 
organized by the IPI, IGS-group, AMAN, and ENSEM.  Earlier editions of 
CANS were held in Taipei (2001), San Francisco (2002), Miami (2003), 
Xiamen (2005), Suzhou (2006), Singapore (2007), Hong Kong (2008), 
Kanazawa (2009), Kuala Lumpur (2010), Sanya (2011), Darmstadt (2012), 
Parary (2013), and Crete (2014).  CANS 2015 is held in cooperation with 
the International Association of Cryptologic Research (IACR).

Papers offering novel research contributions are solicited.  The 
conference focus is on original, high-quality, unpublished research and 
implementation results.  Especially encouraged are submissions of papers 
suggesting novel paradigms, original directions, or non-traditional 
perspectives.  Also of particular interest this year are papers on 
network security, from modeling, measurement, engineering, and attack 

Submitted papers must not substantially overlap with papers that have 
been published or that are submitted in parallel to a journal or a 
conference with formally published proceedings.

Topics of interest include but are not limited to:

- Access Control for Networks
- Adware, Malware, and Spyware
- Anonymity & Pseudonymity
- Authentication, Identification
- Cloud Security
- Cryptographic Algorithms & Protocols
- Denial of Service Protection
- Embedded System Security
- Identity & Trust Management
- Internet Security
- Key Management
- Mobile Code Security
- Multicast Security
- Network Security
- Peer-to-Peer Security
- Security Architectures
- Security in Social Networks
- Sensor Network Security
- Virtual Private Networks
- Wireless and Mobile Security

Each submission should be at most 12 pages, excluding the bibliography 
and appendices, and at most 16 pages in total. Submitted papers should 
be intelligible and self-contained without appendices. Papers must be 
submitted electronically in PDF format. The electronic submission site 
is available at:

Submissions must be anonymous (no author names, affiliations, 
acknowledgments, obvious references). At least one author of every 
accepted paper must register for the conference by the early 
registration deadline indicated by the organizers.  Each accepted paper 
must be presented by one of its authors.  Papers without a registered 
author will be removed from the proceedings.

Accepted papers will be published in Springer's Lecture Notes in 
Computer Science (LNCS) and will be available at the conference. Papers 
should follow the formatting instructions of the Springer LNCS Style 
(, at the time of submission.

Deadline for paper submission: 19 June 2015 11:59:59pm EDT (FIRM)
Notification to authors: 31 August 2015
Camera-ready version due: 21 September 2015

Anas Abou El Kalam, IPI/AMAN, MA

D. Naccache, École Normale Supérieure, FR
M. K. Reiter, Univ. North Carolina at Chapel Hill, US
L. Apvrille, Télécom ParisTech, FR
F. Bao, Hauwei, CN
S. Boldyreva, Georgia Tech, US
S. Checkoway, Johns Hopkins Univ., US
H. Chen, UC Davis, US
L. Chen, HP Labs, UK
S. Chow, Chinese Univ. Hong Kong, HK
J. Coron, Univ. Luxembourg, LU
M. Costa, Microsoft Research, UK
G. Danezis, Univ. College London, UK
E. Diehl, Sony Pictures Entertainment, US
I. Dinur, École Normale Supérieure, FR
T. Dumitras, Univ. Maryland, College Park, US
A. Kiayias, Univ. Athens, GR
J. Lanet, Univ. Limoges, FR
T. Lapoint, CryptoExperts, FR
A. Lehmann, IBM Zurich, CH
C. Nita-Rotaru, Purdue, US
A. Oprea, RSA Labs, US
V. Patriciu, Military Technical Academy, RO
R. Peralta, NIST, US
B. Pinkas, Bar Ilan University, IL
C. Pöpper, Ruhr-Univ. Bochum, DE
B. Preneel, Katholieke Univ. Leuven, BE
R. Reyhanitabar, EPFL, CH
M. Ryan, Univ. Birmingham, UK
P. Ryan, Univ. Luxembourg, LU
A. Sadeghi, TU Darmstadt, DE
R. Safavi-Naini, Univ. Calgary, CA
D. Sauveron, Univ. Limoges, FR
E. Simion, Polytechnic Univ. Bucharest, RO
T. Souvignet, Gendarmerie Nationale, FR
R. Steinwandt, Florida Atlantic Univ., US
W. Susilo, Univ. Wollongong, AU
M. Tibouchi, NTT Secure Platform Laboratories, JP
C. Toma, Acad. Economic Studies Bucharest, RO
I. Verbauwhede, Katholieke Univ. Leuven, BE
G. Wang, Huawei, CN
T. Yen, E8 Security, US
L. Zhang, East China Normal Univ., CN

Y. Desmedt, Univ. of Texas (Dallas), US
J. A. Garay, Yahoo! Labs, US
A. Herzberg, Bar Ilan University, IL
Y. Mu, Univ. of Wollongong, AU
D. Pointcheval, CNRS & ENS Paris, FR
H. Wang, Nanyang Tech. University, SG

This call for papers and additional information about the conference can 
be found at