************************* CALL FOR PAPERS ************************* 19th International Conference on Cryptology and Network Security December 14-16, 2020, Vienna, Austria https://cans2020.at/ ******************************************************************* EXTENDED SUBMISSION DEADLINE: July 5, 2020, 23:59 AoE ******************************************************************* The annual International Conference on Cryptology and Network Security (CAN= S) focuses on current advances in all aspects of cryptology, data protectio= n, and network and computer security. The proceedings will be published in = the Lecture Notes in Computer Science series by Springer. CANS 2020 is held= in cooperation with the International Association of Cryptologic Research = (IACR). *** Submission guidelines *** High quality papers on unpublished research and implementation experiences = are solicited for submission. All papers must be original and not substanti= ally duplicate work that has been published at or is simultaneously submitt= ed to a journal or another conference/workshop with proceedings. All submis= sions must be written in English, at most 20 pages in Springer's Lecture No= tes in Computer Science (LNCS) format, including title, abstract, and bibli= ography. The introduction should summarise the contributions of the paper a= t the level understandable for a non-expert reader. The introduction should= also explain the relation to related work. At most 4 pages of supplemental= material may be provided as well-marked appendices, however, the paper sho= uld be intelligible without this material. Submissions must be anonymous (n= o author names, affiliations, acknowledgments, or obvious references). The conference will also consider short papers, that is, submissions of up = to 8 pages (in the LNCS format), for results that are not yet fully fleshed= out or that simply require few pages to describe but still make a signific= ant contribution. All submissions must be processed with LaTeX2e according = to the instructions given by Springer. Submitted manuscripts must be typese= t in plain Springer LNCS format, in particular without changing the font si= ze, margins or line spacing. Submissions not meeting these guidelines may b= e rejected without consideration of their merits. Papers must be submitted electronically in PDF format via easychair: https:= //easychair.org/conferences/?conf=3Dcans2020 *** Presentation and publication *** At least one author of every accepted paper must register to the conference= by the early registration deadline indicated by the organizers. Papers wit= hout a registered author will be removed from the proceedings. Authors have= to present their own paper(s). Proceedings including all accepted papers w= ill be published in LNCS and will be available at the conference. *** Dates *** Paper submission: July 05, 2020, 23:59AoE Author notification: August 30, 2020 Camera-ready version: September 19, 2020 Conference: December 14-16, 2020 *** Chairs *** PC Chairs: * Haya Shulman (Fraunhofer SIT, Germany) * Serge Vaudenay (EPFL, Switzerland) General Chair: * Stephan Krenn (AIT, Austria) *** Areas of Interest *** Areas of interest include, but are not limited to: * Access Control * Embedded System Security * Security in Pervasive Systems * Anonymity & Pseudonymity * Formal Methods for Security * Security in Social Networks * Applied Cryptography * Hash Functions * Sensor Network Security * Attacks & Malicious Code * Identity Management * Trust Management * Authentication, Identification * Key Management * Usable Security * Biometrics * Language-Based Security * Virtual Private Networks * Block & Stream Ciphers * Malware Analysis and Detection * Wireless and Mobile Security * Blockchain Security and Privacy * Network Security * Peer-to-Peer Security & Privacy * Cryptographic Algorithms and Primitives * Security and Privacy for Big Data * Privacy-Enhancing Technologies * Cryptographic Protocols * Security and Privacy in the Cloud * Public Key Cryptography * Cyberphysical Security * Security in Content Delivery * Secure Distributed Computing * Data and Application Security * Security in Crowdsourcing * Security Architectures * Data and Computation Integrity * Security in zGrid Computing * Security Metrics * Data Protection * Security in the Internet of Things * Security Models * Denial of Service Protection * Security in Location Services * Security Policies