4th International Conference on
	Applied Cryptography and Network Security (ACNS 2006)

			    June 6-9, 2006



      Original papers on all technical aspects of cryptology and
network secuirty are solicited for submission to ACNS'06, the 4th
annual conference on Applied Cryptography and Network Security. There
are two tracks for ACNS: an academic track and an industrial
track. The latter has an emphasis on practical applications. The PC
will consider moving submissions between tracks if the PC feels that a
submission is more appropriate for that track (with author
permission). Topics of relevance include but are not limited to:

    - Applied cryptography, cryptographic constructions 
    - Cryptographic applications: payments, fair exchange,
      time-stamping, auction, voting, polling
    - Denial of service: attacks and countermeasures
    - Email security, spam prevention
    - Fundamental services on network and distributed systems:
      authentication, data integrity, confidentiality, authorization,
      non-repudiation, and availability
    - Implementation, deployment and management of network security policies
    - Integrating security in Internet protocols: routing, naming,
      TCP/IP, multicast, network management
    - Integrating security services with system and application
      security facilities and protocols: message handling, file
      transport/access, directories, time synchronization, database
      management, boot services, mobile computing
    - Intellectual property protection: protocols, implementations,
      metering, watermarking, digital rights management
    - Intrusion avoidance, detection, and response: systems,
      experiences and architectures
    - Network perimeter controls: firewalls, packet filters,
      application gateways
    - Public key infrastructure, key management, certification, and revocation
    - Securing critical infrastructure: routing protocols, and
      emergency communication
    - Security and privacy for emerging technologies: sensor networks,
      wireless/mobile (and ad hoc) networks, bluetooth, 802.11, and
      peer-to-peer systems
    - Security of limited devices: light-weight cryptography,
      efficient protocols and implementations
    - Security modeling and protocol design in the context of rational
      and malicious adversaries
    - Usable security and deployment incentives for security technology
    - Virtual private networks
    - Web security and supporting systems security, such as databases,
      operating systems, etc.

Important Dates

    - Submission Deadline: 15 January 2006 
    - Author Notification: 12 March 2006 
    - Camera-ready Copy: 1 April 2006 
    - Conference: June 6-9, 2006

General Chair

    Feng Bao (Institute for Infocomm Research, Singapore)

Program Chairs:

    Jianying Zhou (Institute for Infocomm Research, Singapore)
    Moti Yung (Columbia University, USA)

Program Committee


Publicity Chair

    Yongfei Han (ONETS, China)

Author Instructions

    Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
other conference or workshop that has proceedings. Accepted
submissions may not appear in any other conference or workshop that
has proceedings. There will be two tracks: an academic track, and a
technical/industrial track. Submissions to the academic track should
emphasize research advances, while submissions to the
technical/industrial track may focus on implementations of known
schemes and deployment observations.

    Authors of accepted papers must guarantee that their paper will be presented at the conference. 

Submission Format

    The submission must be anonymous, with no author names,
affiliations, acknowledgments, or obvious references. It should begin
with a title, a short abstract, and a list of keywords, in Portable
Document Format (.pdf) with all fonts embedded, at most 15 pages
excluding bibliography and appendices. Committee members are not
required to read appendices; the paper should be intelligible without
them. It is strongly preferred that submissions be processed in LaTeX
according to the instructions listed on
http://www.springer.de/comp/lncs/authors.html, since this will be a
mandatory requirement for the final version of papers. Authors are
requested to mark their submissions as "academic track" or
"technical/industrial track". Submissions to the academic track may be
considered for the technical/industrial track. Also, authors are
requested to indicate whether submissions are to be considered for the
best student paper; only papers co-authored and presented by a
full-time student are eligible for this award.

Conference Proceedings

    Proceedings for the academic track will be published in
Springer-Verlag's Lecture Notes in Computer Science and will be
available at the conference. Clear instructions about the preparation
of a final proceedings version will be sent to the authors of accepted
papers. Proceedings for the technical/industrial track will be
published in a separate volume, not the LCNS.


    Please direct questions regarding the conference to organizers at