CALL FOR PAPERS ****************************************************************************** 14th International Conference on Cryptology and Network Security (CANS 2015) Le Méridien N'Fis Hotel Marrakesh, Morrocco -- 8-10 December 2015 http://www.cans2015.org/ ****************************************************************************** The International Conference on Cryptology and Network Security (CANS) is an annual conference focusing on all aspects of cryptology and network security, attracting cutting-edge results from world-renowned scientists in the area. Proceedings of CANS are published in Springer's Lecture Notes in Computer Science series. They are distributed at the conference and are included in all major online databases. The 14th edition of the conference will be held in Marrakesh, Morrocco, organized by the IPI, IGS-group, AMAN, and ENSEM. Earlier editions of CANS were held in Taipei (2001), San Francisco (2002), Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), Hong Kong (2008), Kanazawa (2009), Kuala Lumpur (2010), Sanya (2011), Darmstadt (2012), Parary (2013), and Crete (2014). CANS 2015 is held in cooperation with the International Association of Cryptologic Research (IACR). OVERVIEW Papers offering novel research contributions are solicited. The conference focus is on original, high-quality, unpublished research and implementation results. Especially encouraged are submissions of papers suggesting novel paradigms, original directions, or non-traditional perspectives. Also of particular interest this year are papers on network security, from modeling, measurement, engineering, and attack perspectives. Submitted papers must not substantially overlap with papers that have been published or that are submitted in parallel to a journal or a conference with formally published proceedings. TOPICS OF INTEREST Topics of interest include but are not limited to: - Access Control for Networks - Adware, Malware, and Spyware - Anonymity & Pseudonymity - Authentication, Identification - Cloud Security - Cryptographic Algorithms & Protocols - Denial of Service Protection - Embedded System Security - Identity & Trust Management - Internet Security - Key Management - Mobile Code Security - Multicast Security - Network Security - Peer-to-Peer Security - Security Architectures - Security in Social Networks - Sensor Network Security - Virtual Private Networks - Wireless and Mobile Security INSTRUCTIONS FOR AUTHORS Each submission should be at most 12 pages, excluding the bibliography and appendices, and at most 16 pages in total. Submitted papers should be intelligible and self-contained without appendices. Papers must be submitted electronically in PDF format. The electronic submission site is available at: https://cans2015.cs.unc.edu/ Submissions must be anonymous (no author names, affiliations, acknowledgments, obvious references). At least one author of every accepted paper must register for the conference by the early registration deadline indicated by the organizers. Each accepted paper must be presented by one of its authors. Papers without a registered author will be removed from the proceedings. Accepted papers will be published in Springer's Lecture Notes in Computer Science (LNCS) and will be available at the conference. Papers should follow the formatting instructions of the Springer LNCS Style (http://www.springer.com/lncs), at the time of submission. IMPORTANT DATES Deadline for paper submission: 19 June 2015 11:59:59pm EDT (FIRM) Notification to authors: 31 August 2015 Camera-ready version due: 21 September 2015 GENERAL CHAIR Anas Abou El Kalam, IPI/AMAN, MA PROGRAM COMMITTEE CHAIRS D. Naccache, École Normale Supérieure, FR M. K. Reiter, Univ. North Carolina at Chapel Hill, US p PROGRAM COMMITTEE MEMBERS L. Apvrille, Télécom ParisTech, FR F. Bao, Hauwei, CN S. Boldyreva, Georgia Tech, US S. Checkoway, Johns Hopkins Univ., US H. Chen, UC Davis, US L. Chen, HP Labs, UK S. Chow, Chinese Univ. Hong Kong, HK J. Coron, Univ. Luxembourg, LU M. Costa, Microsoft Research, UK G. Danezis, Univ. College London, UK E. Diehl, Sony Pictures Entertainment, US I. Dinur, École Normale Supérieure, FR T. Dumitras, Univ. Maryland, College Park, US A. Kiayias, Univ. Athens, GR J. Lanet, Univ. Limoges, FR T. Lapoint, CryptoExperts, FR A. Lehmann, IBM Zurich, CH C. Nita-Rotaru, Purdue, US A. Oprea, RSA Labs, US V. Patriciu, Military Technical Academy, RO R. Peralta, NIST, US B. Pinkas, Bar Ilan University, IL C. Pöpper, Ruhr-Univ. Bochum, DE B. Preneel, Katholieke Univ. Leuven, BE R. Reyhanitabar, EPFL, CH M. Ryan, Univ. Birmingham, UK P. Ryan, Univ. Luxembourg, LU A. Sadeghi, TU Darmstadt, DE R. Safavi-Naini, Univ. Calgary, CA D. Sauveron, Univ. Limoges, FR E. Simion, Polytechnic Univ. Bucharest, RO T. Souvignet, Gendarmerie Nationale, FR R. Steinwandt, Florida Atlantic Univ., US W. Susilo, Univ. Wollongong, AU M. Tibouchi, NTT Secure Platform Laboratories, JP C. Toma, Acad. Economic Studies Bucharest, RO I. Verbauwhede, Katholieke Univ. Leuven, BE G. Wang, Huawei, CN T. Yen, E8 Security, US L. Zhang, East China Normal Univ., CN STEERING COMMITTEE Y. Desmedt, Univ. of Texas (Dallas), US J. A. Garay, Yahoo! Labs, US A. Herzberg, Bar Ilan University, IL Y. Mu, Univ. of Wollongong, AU D. Pointcheval, CNRS & ENS Paris, FR H. Wang, Nanyang Tech. University, SG This call for papers and additional information about the conference can be found at http://www.cans2015.org/.