************************* CALL FOR PAPERS *************************
19th International Conference on Cryptology and Network Security
               December 14-16, 2020, Vienna, Austria
                      https://cans2020.at/
*******************************************************************
          EXTENDED SUBMISSION DEADLINE: July 5, 2020, 23:59 AoE
*******************************************************************

The annual International Conference on Cryptology and Network Security (CAN=
S) focuses on current advances in all aspects of cryptology, data protectio=
n, and network and computer security. The proceedings will be published in =
the Lecture Notes in Computer Science series by Springer. CANS 2020 is held=
 in cooperation with the International Association of Cryptologic Research =
(IACR).

*** Submission guidelines ***

High quality papers on unpublished research and implementation experiences =
are solicited for submission. All papers must be original and not substanti=
ally duplicate work that has been published at or is simultaneously submitt=
ed to a journal or another conference/workshop with proceedings. All submis=
sions must be written in English, at most 20 pages in Springer's Lecture No=
tes in Computer Science (LNCS) format, including title, abstract, and bibli=
ography. The introduction should summarise the contributions of the paper a=
t the level understandable for a non-expert reader. The introduction should=
 also explain the relation to related work. At most 4 pages of supplemental=
 material may be provided as well-marked appendices, however, the paper sho=
uld be intelligible without this material. Submissions must be anonymous (n=
o author names, affiliations, acknowledgments, or obvious references).

The conference will also consider short papers, that is, submissions of up =
to 8 pages (in the LNCS format), for results that are not yet fully fleshed=
 out or that simply require few pages to describe but still make a signific=
ant contribution. All submissions must be processed with LaTeX2e according =
to the instructions given by Springer. Submitted manuscripts must be typese=
t in plain Springer LNCS format, in particular without changing the font si=
ze, margins or line spacing. Submissions not meeting these guidelines may b=
e rejected without consideration of their merits.

Papers must be submitted electronically in PDF format via easychair: https:=
//easychair.org/conferences/?conf=3Dcans2020

*** Presentation and publication ***

At least one author of every accepted paper must register to the conference=
 by the early registration deadline indicated by the organizers. Papers wit=
hout a registered author will be removed from the proceedings. Authors have=
 to present their own paper(s). Proceedings including all accepted papers w=
ill be published in LNCS and will be available at the conference.

*** Dates ***
Paper submission: July 05, 2020, 23:59AoE
Author notification: August 30, 2020
Camera-ready version: September 19, 2020
Conference: December 14-16, 2020

*** Chairs ***
PC Chairs:
* Haya Shulman (Fraunhofer  SIT, Germany)
* Serge Vaudenay (EPFL, Switzerland)
General Chair:
* Stephan Krenn (AIT, Austria)

*** Areas of Interest ***
Areas of interest include, but are not limited to:

* Access Control
* Embedded System Security
* Security in Pervasive Systems
* Anonymity & Pseudonymity
* Formal Methods for Security
* Security in Social Networks
* Applied Cryptography
* Hash Functions
* Sensor Network Security
* Attacks & Malicious Code
* Identity Management
* Trust Management
* Authentication, Identification
* Key Management
* Usable Security
* Biometrics
* Language-Based Security
* Virtual Private Networks
* Block & Stream Ciphers
* Malware Analysis and Detection
* Wireless and Mobile Security
* Blockchain Security and Privacy
* Network Security
* Peer-to-Peer Security & Privacy
* Cryptographic Algorithms and Primitives
* Security and Privacy for Big Data
* Privacy-Enhancing Technologies
* Cryptographic Protocols
* Security and Privacy in the Cloud
* Public Key Cryptography
* Cyberphysical Security
* Security in Content Delivery
* Secure Distributed Computing
* Data and Application Security
* Security in Crowdsourcing
* Security Architectures
* Data and Computation Integrity
* Security in zGrid Computing
* Security Metrics
* Data Protection
* Security in the Internet of Things
* Security Models
* Denial of Service Protection
* Security in Location Services
* Security Policies