Call for Papers
Call for Papers [pdf (866KB)]
The main goal of this conference is to promote research on all aspects of network security, as well as to build a bridge between research on cryptography and on network security. We therefore welcome scientific and academic papers with this focus. Previous CANS have been held in Taipei (2001), San Francisco (2002), Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), and Hong Kong (2008).
Areas of interest for CANS 2009 include, but are not limited to:
Instructions for Authors
Papers on cryptology and network security are welcome. Papers that make a substantial link between these areas will be given priority. Authors of such papers are encouraged to elaborate on the relevant connection in a subsection of the introduction. High-quality papers on pure cryptology or pure network security may also be accepted.
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other conference or workshop with proceedings. Submissions should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. The total length of the final versions for Springer's LNCS will be at most 20 pages. Committee members are not required to read appendices; the paper should be intelligible without them. All submissions should be anonymous. Authors of accepted papers must guarantee that at least one of the authors will attend the conference and present their paper.
Submitted papers should follow the formatting instructions of theSpringer LNCS Style. Please check the Information for LNCS Authors page at Springer at http://www.springer.com/lncs for style and formatting guidelines. Submissions not meeting the submission guidelines risk rejection without consideration of their merits.
The conference proceedings will be published in the Lecture Notes in Computer Science series by Springer Verlag (http://www.springer.com/lncs), and be available at the conference.
|Submission Deadline||17 June 2009 (12:00:00 JST) (extended)|
|Acceptance Notification||14 August 2009 (JST)|
|Camera-ready Copy Due||4 September 2009|
|Conference||12 - 14 December 2009|
|Craig Gentry (IBM Research,US)||Computing on Encrypted Data|
|Adrian Perrig (CMU, US)||Building Secure Networked Systems with Code Attestation|
|Adam Smith (Penn State Univ, US)||A Cryptographer's-eye View of Privacy in Statistical Databases|
Best Paper Award
The Program Committee will consider giving a Best Paper Award to the submission with highest merits. (Details to be announced.)
A limited number of stipends are available to those unable to obtain funding to attend the conference, and to students whose papers are accepted and who will present the paper themselves.
Stipend applications become available on our Web site on July 23rd.
Application deadline for stipends sets at August 21st.
Notifications are sent about 10 days after the deadline.