---------------------------------------------------------------------------- CALL FOR PAPERS 4th International Conference on Information Security and Cryptology Inscrypt 2008 December 14 - 17, 2008, Beijing, China http://www.inscrypt.cn/ CFP: Information Security and Cryptology
The 4th International Conferences on Information Security and Cryptology
will be held in Beijing from December 14 to 17, 2008. The conference is
co-organized by Chinese Association for Cryptologic Research and The
State Key Laboratory of Information Security (SKLOIS) of China. It is an
annual conference targeting the top research results in the related
area. The formal conference proceedings will be published by Springer
Verlag in LNCS series after conference.  

Authors are invited to submit full papers presenting new research
results related to cryptology, information security and their
applications. All submissions must describe original research that is
not published or currently under review by another conference or
journal. Areas of interest include, but are not limited to:

Access Control                          Provable Security 
Authentication and Authorization        Secure Multiparty Computation
Biometric Security                      Foundations of Cryptography
Distributed System Security             Secret Key and Public Key
Database Security                       Implementation of Cryptosystems
Electronic Commerce Security            Hash Functions and MACs
Intrusion Detection                     Block Cipher Modes of Operation
Information Hiding and Watermarking     Intellectual Property Protection
Key Management and Key Recovery         Mobile System Security
Network Security                        Operating System Security
Security Protocols and Their Analysis   Risk Evaluation and Security
Security Modeling and Architectures     Prevention and Detection of
Malicious Codes

Conference language is English. All submissions must be anonymous, with
no author names, affiliations, acknowledgments, or obvious references.
It should begin with a title, a short abstract, and a list of key words,
and its introduction should summarize the contributions of the paper at
a level appropriate for a non-specialist reader. The paper should be
intelligible and self-contained within 20 pages including references and
appendices and must be submitted electronically. Submissions not meeting
these guidelines risk rejection without consideration of their merits.
It is highly advised to prepare the submissions in the Springer LNCS
format (see
00.html). A detailed description of the electronic submission procedure
can be found from a link at http://www.inscrypt.cn/.

Deadline for Submission:	                       August 20, 2008
Notification of Acceptance:	                       October 25, 2008
Pre-proceedings version deadline:	               November 10, 2008
Proceedings version deadline:	                       January 15, 2009

Dengguo Feng           SKLOIS, Institute of Software, CAS, China

Moti Yung              Columbia University, USA (co-Chair)
Peng Liu               Pennsylvania State University, USA (co-Chair)
Dongdai Lin            Institute of Software, CAS, China (co-chair)

Vladimir S. Anashin    Moscow University, Russia
Vijay Atluri           Rutgers University, USA
Zhenfu Cao             Shanghai Jiaotong University, China
Claude Carlet          INRIA,Universite Paris 8, France
Jean-Sebastien Coron   University of Luxembourg
Marc Dacier            Symantec Research Labs Europe 
Cunsheng Ding          Hong Kong University of Science and Technology,
Jintai Ding            University of Cincinnati, USA
Stefan Dziembowski     University of Rome "La Sapienza", Italy
Jean-Charles Faugere   INRIA, France
Guang Gong             University of Waterloo, Canada
Qijun Gu               Texas State University, USA
Xuxian Jiang           NC State University, USA
Jiwu Jing              Graduate University of CAS, China
Brian King             Indiana University-Purdue University,
Indianapolis, USA
Miroslaw Kutylowski    University of Wroclaw, Poland
Chi-Sung Lai           National Cheng Kung University, Taiwan
Albert Levi            Sabanci University, Turkey
Jianhua Li             Shanghai Jiaotong University, China
Jie Li                 University of Tsukuba, Japan
Ninghui Li             Purdue University, USA
Yingjiu Li             Singapore Management University, Singapore
Benoit Libert          Universite Catholique de Louvain, Belgium
Javier Lopez           University of Malaga, Spain
Xiapu Luo              The Hong Kong Polytechnic University, Hongkong
Bodo Moeller           Google Inc., Zurich
Mridul Nandi           NIST, USA
Peng Ning              North Carolina State University, USA
Eiji Okamoto           Tsukuba University, Japan
Ludovic Perret         LIP6/INRIA Paris-Rocquencourt, France
Giuseppe Persiano      University of Salerno, Italy
Raphael C.-W. Phan     Loughborough University, UK
Bimal K. Roy           Indian Statistical Institute, India
Kouichi Sakurai        Kyushu University, Japan
Bhavani Thuraisingham  University of Texas at Dallas, USA
Carmela Troncoso       K.U. Leuven, Belgium
Shabsi Walfish         Google Inc. USA
Huaxiong Wang          Nanyang Technological University, Singapore
Xiaoyun Wang           Shandong University, China
Chuankun Wu            Institute of Software, CAS, China
Shouhai Xu             University of Texas at San Antonio, USA
Meng Yu                Western Illinois University, USA
Erik Zenner            Technical University of Denmark
Yuliang Zheng          University of North Carolina at Charlotte, USA
Jianying Zhou          Institute for Infocomm Research, Singapore
Sencun Zhu             The Pennsylvania State University, USA

Jiwu Jing              Graduated University, CAS, China
Zhijun Qiang           Chinese Association for Cryptology Research