Original papers on all aspects of applied cryptography as well ascomputer/network security and privacy are solicited. Topics of interestinclude, but are not limited, to:- Applied cryptography and cryptographic protocols- Cryptographic primitives, e.g., cryptosystems, ciphers and hash functions- Network security protocols- Privacy, anonymity and untraceability - Security for the next-generation Internet- Internet fraud, e.g., phishing, pharming, spam, and click fraud- Email and web security- Public key infrastructures, key management, certification and revocation- Trust and its metrics - Usable security and cryptography- Intellectual property protection and digital rights management- Modeling and protocol design - Automated protocols analysis - Secure virtualization and security in cloud computing- Security and privacy in sensor, mobile, ad hoc and delay-tolerant networks, p2p systems, as well as wireless (e.g., RFID, Bluetooth) communications.Papers suggesting novel paradigms, original directions, or non-traditional perspectives are especially welcome. As in previousyears, there will be an academic track and an industrial track.Submissions to the former should emphasize research contributions, whilesubmissions to the latter may focus on implementation and deployment ofreal-world systems. The academic track will have proceedings published aspart of the Springer LNCS series and will be available at the conference.The industrial track will only have presentations without formal proceedings.* Instructions for paper submissionEach submission must be thoroughly anonymized, with no author names,affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of meaningful keywords. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal orworkshop that has proceedings.All submissions are limited to 18 pages in the llncs style, includingbibliography and any appendices; each submission must be intelligible and self-contained within this length. Submissions not meeting these guidelines will be rejected without review.Authors should indicate whether their submission should be considered for the best student paper award; any paper co-authored by a full-timestudent is eligible. Authors of accepted papers must guarantee thattheir paper will be presented at the conference.Authors of selected papers will be invited to submit extended versions oftheir ACNS'11 papers to a Special Issue of the ISI-ranked International Journal of Information Security (IJIS).* Program ChairsJavier Lopez, University of Malaga, SpainGene Tsudik, University of California, Irvine, USA* General ChairsRoberto di Pietro, University of Roma Tre, ItalyRodrigo Roman, University of Malaga, Spain* Publicity ChairsCristina Alcaraz, University of Malaga, SpainClaudio Soriente, Madrid Polytechnic University, Spain* Web ChairErsin Uzun, PARC, USA* Program CommitteeImad Aad, Nokia Research Center, Switzerland Michel Abdalla, ENS, France Elli Androulaki, Columbia University, USA N. Asokan, Nokia Research, Finland Giuseppe Ateniese, Johns Hopkins University, USA Alex Biryukov, Univ. of Luxembourg, Luxembourg Colin Boyd, Queensland University of Technology, Australia Jan Camenisch, IBM Zurich Research, Switzerland Jordi Castella, Universitat Rovira Virgili, SpainDario Catalano, Universita di Catania, Italy Liqun Chen, HP, UK Mauro Conti, VU Amsterdam, Netherlands Vanesa Daza, Univesity Pompeu Fabra, Spain Robert Deng, Singapore Management University, Singapore Xuhua Ding, SMU, Singapore Karim Eldefrawy, Hughes Research Laboratory, USA Aurelien Francillon, ETH, SwitzerlandEiichiro Fujisaki, NTT, Japan David Galindo, University of Luxembourg, Luxembourg Anabel Gonzalez-Tablas, UC3M, Spain Maribel Gonzalez-Vasco, URJC, Spain Goichiro Hanaoka, AIST, JapanJuan Hernandez, UPC, Spain Javier Herranz, UPC, Spain Jaap-Henk Hoepman, Radboud University Nijmegen, Nethelands Sotiris Ioannidis, FORTH, GreeceSeny Kamara, Microsoft, USAApu Kapadia, Indiana University Bloomington, USA Angelos D. Keromytis, Columbia University, USA Costas Lambrinoudakis, Univesity of Piraeus, Greece Di Ma, University of Michigan-Dearborn, USA Masahiro Mambo, University of Tsukuba, JapanLuigi Mancini, La Sapienza, Italy Mark Manulis, TU Darmstadt & CASED, Germany Gregorio Martinez, University of Murcia, Spain Ivan Martinovic, TU Kaiserlautern, Germany Refik Molva, EURECOM, France David Naccache, ENS, France Gabriele Oligieri, CNR, Italy Melek Onen, EURECOM, France Giuseppe Persiano, Univ. di Salerno, Italy Kasper Rasmussen, ETH, Switzerland Ahmad-Reza Sadeghi, Ruhr-Universität Bochum, Germany Nitesh Saxena, Polytechnic Institute of New York Univ., USAAbdullatif Shikfa, Alcatel-Lucent Bell Labs, FranceNicolas Sklavos, TEI of Patras, GreeceJessica Staddon, Google, USAAngelos Stavrou, George Mason University, USACarmela Troncoso, KU Leuven, Belgium Serge Vaudenay, EPFL, Switzerland Ivan Visconti, University of Salerno,Italy - UCLA, USA Shouhuai Xu, University of Texas at San Antonio, USA Jianying Zhou, I2R, Singapore
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor. Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.