CALL FOR PAPERS 
9th International Conference on Information Security and Cryptology 
                          Inscrypt 2013 

             November 27 - 30, 2013, Guangzhou, China 
                     http://www.inscrypt.cn/

The 9th China International Conference on Information Security and
Cryptology (INSCRYPT 2013) will be held in Guangzhou from November 27
to November 30, 2013.

Inscrypt 2013 seeks high-quality research contributions in the form of
well developed papers. Topics of interest encompass research advances
in ALL areas of information security, cryptology, and their
applications. The conference proceedings will be published by
Springer-Verlag in LNCS series.

Papers 
====== 

Authors are invited to submit full papers presenting new research
results related to cryptology, information security and their
applications. All submissions must describe original research that is
not published or currently under review by another conference or
journal. Areas of interest include, but are not limited to:

Access Control 
Authentication and Authorization 
Biometric Security 
Distributed System Security 
Big Data and Cloud Security 
Electronic Commerce Security 
Intrusion Detection 
Information Hiding and Watermarking 
Key Management and Key Recovery 
Network Security 
Security Protocols and Their Analysis 
Security Modeling and Architectures 
Provable Security 
Secure Multiparty Computation 
Foundations of Cryptography 
Secret Key and Public Key Cryptosystems 
Implementation of Cryptosystems 
Hash Functions and MACs 
Block Cipher Modes of Operation 
Intellectual Property Protection 
Mobile System Security 
Operating System Security 
Risk Evaluation and Security Certification 
Prevention and Detection of Malicious Codes

Instruction for Authors 
======================= 

Conference language is English. All submissions must be anonymous,
with no author names, affiliations, acknowledgments, or obvious
references. It should begin with a title, a short abstract, and a list
of key words, and its introduction should summarize the contributions
of the paper at a level appropriate for a non-specialist reader. The
paper should be intelligible and self-contained within 20 pages
including references and appendices and must be submitted
electronically to
http://www.easychair.org/conferences/?conf=inscrypt2013.  Submissions
not meeting these guidelines risk rejection without consideration of
their merits. It is highly advised to prepare the submissions in the
Springer LNCS format (see
http://www.springeronline.com/sgw/cda/frontpage/0,11855,5-164-2-72376-0,00.html).
More information can be found at conference web site
http://www.inscrypt.cn/.

Important Dates 
=============== 

Deadline for Submission: August 22, 2013 
Notification of Acceptance: October 22, 2013 
Pre-proceedings version deadline: November 5, 2013 
Proceedings version deadline: December 21, 2013

General Chair: 
============== 
Dingyi Pei   Guangzhou University, China

Program Co-Chairs: 
=============== 

Dongdai Lin  SKLOIS, Institute of Information Engineering, CAS, China 
Shouhuai Xu  University of Texas at San Antonio, USA 
Moti Yung    Google Inc. and Columbia University, USA

Technical Program Committee 
=========================== 

Gouqiang Bai         Tsinghua University
Elisa Bertino        Purdue University
Zhenfu Cao           Shanghai Jiaotong University
Bogdan Carbunar      Florida International University
Kefei Chen           Shanghai Jiaotong University
Liqun Chen           Hewlett-Packard Laboratories
Zhong Chen           Peking University
Sherman S. M. Chow   Chinese University of Hong Kong
Ed Dawson            Research Director
Jintai Ding          University of Cincinnati
Cunsheng Ding        Hong Kong University of Science and Technology
Xuhua Ding           Singapore Management University
Shlomi Dolev         Ben-Gurion University of the Negev
Yingfei Dong         University of Hawaii
Lei Hu               SKLOIS, Chinese Academy of Sciences, China
Miroslaw Kutylowski  Wroclaw University of Technology
Xuejia Lai           Shanghai Jiaotong University
Jiangtao Li          Intel Corporation
Hui Li               Xidian University
Zhiqiang Lin         University of Texas at Dallas
Donggang Liu         University of Texas at Arlington
Peng Liu             The Pennsylvania State University
Di Ma                University of Michigan-Dearborn
Subhamoy Maitra      Indian Statistical Institute
Florian Mendel       Graz University of Technology, Austria
Atsuko Miyaji        Japan Advanced Institute of Science and Technology
Yi Mu                University of Wollongong, Australia
Claudio Orlandi      Aarhus University
Xinming Ou           Kansas State University
Ludovic Perret       UPMC/LIP6 INRIA/SALSA
Giuseppe Persiano    Universita' di Salerno
Bertram Poettering   Royal Holloway, University of London
Kouichi Sakurai      Kyushu University
Nitesh Saxena        University of Alabama at Birmingham
Jae Hong Seo         Myongji University, Youngin, Republic of Korea
Claudio Soriente     ETH Zürich
Wen-Guey Tzeng       National Chiao Tung University
Yevgeniy Vahlis      AT&T Labs
Xiaofeng Wang        Indiana University, USA
Wenling Wu           Institute of Software, CAS, China
Huaxiong Wang        Nanyang Technological University
Guilin Wang          University of Wollongong
Duncan Wong          City University of Hong Kong
Maozhi Xu            Peking University
Danfeng Yao          Virginia Tech
Chung-Huang Yang     National Kaohsiung Normal University
Yunlei Zhao          Fudan University
Fangguo Zhang        Sun Yat-sen University
Rui Zhang            Chinese Academy of Sciences, P.R.C.
Hong-Sheng Zhou      University of Maryland
Yuliang Zheng        UNC Charlotte
Cliff Zou            University of Central Florida