Call for Papers

Call for Papers [pdf (866KB)]

Overview

The main goal of this conference is to promote research on all aspects of network security, as well as to build a bridge between research on cryptography and on network security. We therefore welcome scientific and academic papers with this focus. Previous CANS have been held in Taipei (2001), San Francisco (2002), Miami (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), and Hong Kong (2008).

Topics

Areas of interest for CANS 2009 include, but are not limited to:

  • Ad Hoc and Sensor Network Security
  • Access Control for Networks
  • Anonymity and Pseudonymity
  • Authentication Services
  • Block and Stream Cipher Design
  • Cryptographic Protocols and Schemes
  • Denial of Service Protection
  • Digital Rights Management
  • Fast Cryptographic Algorithms
  • Hash Functions
  • Identity and Trust Management
  • Information Hiding and Watermarking
  • Internet and Router Security
  • Intrusion Detection and Prevention
  • Mobile and Wireless Network Security
  • Multicast Security
  • Phishing and Online Fraud Prevention
  • Peer-to-Peer Network Security
  • PKI
  • Security Modeling and Architectures
  • Secure Protocols (SSH, SSL, ...) and Applications
  • Spam Protection
  • Spyware Analysis and Detection
  • Virtual Private Networks

Instructions for Authors

Papers on cryptology and network security are welcome. Papers that make a substantial link between these areas will be given priority. Authors of such papers are encouraged to elaborate on the relevant connection in a subsection of the introduction. High-quality papers on pure cryptology or pure network security may also be accepted.

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other conference or workshop with proceedings. Submissions should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. The total length of the final versions for Springer's LNCS will be at most 20 pages. Committee members are not required to read appendices; the paper should be intelligible without them. All submissions should be anonymous. Authors of accepted papers must guarantee that at least one of the authors will attend the conference and present their paper.

Submitted papers should follow the formatting instructions of theSpringer LNCS Style. Please check the Information for LNCS Authors page at Springer at http://www.springer.com/lncs for style and formatting guidelines. Submissions not meeting the submission guidelines risk rejection without consideration of their merits.

Proceedings

The conference proceedings will be published in the Lecture Notes in Computer Science series by Springer Verlag (http://www.springer.com/lncs), and be available at the conference.

Important Dates

Submission Deadline 17 June 2009 (12:00:00 JST) (extended)
Acceptance Notification 14 August 2009 (JST)
Camera-ready Copy Due 4 September 2009
Conference 12 - 14 December 2009

Invited Speakers

Craig Gentry (IBM Research,US) Computing on Encrypted Data
Adrian Perrig (CMU, US) Building Secure Networked Systems with Code Attestation
Adam Smith (Penn State Univ, US) A Cryptographer's-eye View of Privacy in Statistical Databases

Best Paper Award

The Program Committee will consider giving a Best Paper Award to the submission with highest merits. (Details to be announced.)

Stipend

A limited number of stipends are available to those unable to obtain funding to attend the conference, and to students whose papers are accepted and who will present the paper themselves.

Stipend applications become available on our Web site on July 23rd.
Application deadline for stipends sets at August 21st.
Notifications are sent about 10 days after the deadline.