Inscrypt 2012
http://inscrypt2012.im.pwr.wroc.pl/2012/inscrypt2012cfp.html
The 8th China International Conference on Information Security and
Cryptology (Inscrypt'2012) Nov 28 - Dec 1, 2012, Beijing

*Preliminary Call-For-Papers* The 8th China International Conference on
Information Security and Cryptology (*INSCRYPT 2012*) will be held in
Beijing from November 28th to December 1st, 2012, which is immediately
followed by *Asiacrypt 2012*, to be held in the same venue. Inscrypt 2012
seeks high-quality research contributions in the form of well developed
papers. Topics of interest encompass research advances in ALL areas of
information security, cryptology, and their applications. The conference
post-proceedings will be published by Springer-Verlag in LNCS series.

*AUTHOR INSTRUCTIONS:* Technical papers describing original research
contributions are solicited. Submissions must not be concurrently under
review by a conference, journal or any other venue that has proceedings.
All submissions must be written in English, and must be anonymous, with no
author names, affiliations, acknowledgments, or obvious references. Such a
submission should begin with a title, a short abstract, a list of key
words, and its introduction should summarize the contributions of the paper
at a level appropriate for a non-specialist reader. The paper should be
intelligible and self-contained within 20 pages including references and
appendices, and must be submitted electronically to
http://www.easychair.org/conferences/?conf=inscrypt2012

*TOPICS* of interest include, but are not limited to, the following:

   - Access Control
   - Authentication and Authorization
   - Biometric security
   - Block cipher modes of operation
   - Cloud computing security
   - Database security
   - Digital asset security and protection
   - Electronic Commerce Security
   - Foundations of Cryptography
   - Hash functions and MACs
   - Information Hiding and Watermarking
   - Intrusion Detection
   - Key Management and Key Recovery
   - Mobile network Security
   - Network Security
   - Operating system security
   - Privacy protection
   - Risk evaluation and security modeling
   - Secret Key and Public Key Cryptography
   - Security issues in Internet of Things
   - Security and Cryptographic Protocols
   - Software security and protection
   - System security

*IMPORTANT DATES*  Deadline for Submission: August 20, 2012 Notification of
Acceptance: October 20, 2012 Camera-ready for pre-proceedings: November 5,
2012

*CONFERENCE WEBSITE:* More information about the conference updates will be
available at http://www.inscrypt.cn

*Conference general chair:* Dongdai Lin, Chinese Academy of Sciences

*Program Co-Chairs:* Miroslaw Kutylowski, Wroclaw University of Technology,
Poland
Moti Yung, Google Inc. and Columbia University, USA

  *This page was last updated on December 2, 2011. A printable version of
this preliminary cfp is available from
here http://inscrypt2012.im.pwr.wroc.pl/2012/inscrypt2012cfp.pdf
*