m (Text replacement - "Homepage=" to "Official Website=") |
Curator 91 (talk | contribs) |
||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
|Acronym=CANS 2021 | |Acronym=CANS 2021 | ||
− | |Title=International Conference on Cryptology and Network Security | + | |Title=20th International Conference on Cryptology and Network Security |
|Ordinal=20 | |Ordinal=20 | ||
+ | |In Event Series=Event Series:CANS | ||
+ | |Single Day Event=no | ||
+ | |Start Date=2021/12/13 | ||
+ | |End Date=2021/12/15 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=online | ||
+ | |Academic Field=Cryptology; Network Security | ||
+ | |Official Website=https://cans2021.at/ | ||
+ | |Submission Link=https://easychair.org/conferences/?conf=cans2021 | ||
+ | |DOI=10.25798/qat5-ws21 | ||
|Type=Conference | |Type=Conference | ||
− | |||
|Twitter account=@CansConference | |Twitter account=@CansConference | ||
− | |||
− | |||
− | |||
|has general chair=Stephan Krenn | |has general chair=Stephan Krenn | ||
|has program chair=Mauro Conti, Marc Stevens | |has program chair=Mauro Conti, Marc Stevens | ||
Line 15: | Line 21: | ||
|pageEditor=User:Curator 53 | |pageEditor=User:Curator 53 | ||
|contributionType=1 | |contributionType=1 | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
{{Event Deadline | {{Event Deadline | ||
+ | |Notification Deadline=2021/09/01 | ||
|Paper Deadline=2021/06/01 | |Paper Deadline=2021/06/01 | ||
− | |||
|Camera-Ready Deadline=2021/10/01 | |Camera-Ready Deadline=2021/10/01 | ||
|Submission Deadline=2021/06/01 | |Submission Deadline=2021/06/01 | ||
}} | }} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=Austrian Institute of Technology | ||
+ | }} | ||
+ | {{Event Metric}} | ||
{{S Event}} | {{S Event}} | ||
− | ==== Areas of Interest ==== | + | ====Areas of Interest==== |
− | * • Access Control | + | *• Access Control |
− | * • Embedded System Security | + | *• Embedded System Security |
− | * • Security in Pervasive Systems | + | *• Security in Pervasive Systems |
− | * • Anonymity & Pseudonymity | + | *• Anonymity & Pseudonymity |
− | * • Formal Methods for Security | + | *• Formal Methods for Security |
− | * • Security in Social Networks | + | *• Security in Social Networks |
− | * • Applied Cryptography | + | *• Applied Cryptography |
− | * • Hash Functions | + | *• Hash Functions |
− | * • Sensor Network Security | + | *• Sensor Network Security |
− | * • Attacks & Malicious Code | + | *• Attacks & Malicious Code |
− | * • Identity Management | + | *• Identity Management |
− | * • Trust Management | + | *• Trust Management |
− | * • Authentication & Identification | + | *• Authentication & Identification |
− | * • Key Management | + | *• Key Management |
− | * • Usable Security | + | *• Usable Security |
− | * • Biometrics | + | *• Biometrics |
− | * • Language-Based Security | + | *• Language-Based Security |
− | * • Virtual Private Networks | + | *• Virtual Private Networks |
− | * • Block & Stream Ciphers | + | *• Block & Stream Ciphers |
− | * • Malware Analysis and Detection | + | *• Malware Analysis and Detection |
− | * • Wireless and Mobile Security | + | *• Wireless and Mobile Security |
− | * • Blockchain Security and Privacy | + | *• Blockchain Security and Privacy |
− | * • Network Security | + | *• Network Security |
− | * • Peer-to-Peer Security & Privacy | + | *• Peer-to-Peer Security & Privacy |
− | * • Cryptographic Algorithms and Primitives | + | *• Cryptographic Algorithms and Primitives |
− | * • Security and Privacy for Big Data | + | *• Security and Privacy for Big Data |
− | * • Privacy-Enhancing Technologies | + | *• Privacy-Enhancing Technologies |
− | * • Cryptographic Protocols | + | *• Cryptographic Protocols |
− | * • Security and Privacy in the Cloud | + | *• Security and Privacy in the Cloud |
− | * • Public Key Cryptography | + | *• Public Key Cryptography |
− | * • Cyberphysical Security | + | *• Cyberphysical Security |
− | * • Security in Content Delivery | + | *• Security in Content Delivery |
− | * • Secure Distributed Computing | + | *• Secure Distributed Computing |
− | * • Data and Application Security | + | *• Data and Application Security |
− | * • Security in Crowdsourcing | + | *• Security in Crowdsourcing |
− | * • Security Architectures | + | *• Security Architectures |
− | * • Denial of Service Protection | + | *• Denial of Service Protection |
− | * • Security in Grid Computing | + | *• Security in Grid Computing |
− | * • Security Metrics | + | *• Security Metrics |
− | * • Data Protection | + | *• Data Protection |
− | * • Security in the Internet of Things | + | *• Security in the Internet of Things |
− | * • Security Models | + | *• Security Models |
− | * • Data and Computation Integrity | + | *• Data and Computation Integrity |
− | * • Security in Location Services | + | *• Security in Location Services |
− | * • Security Policies | + | *• Security Policies |
Latest revision as of 11:47, 8 December 2023
The document "CANS 2021" was published on "2023-12-08T11:47:33" on the website "ConfIDent" under the URL https://confident-conference.org/index.php/Event:CANS 2021.
The document "CANS 2021" describes an event in the sense of a conference.
The document "CANS 2021" contains information about the event "CANS 2021" with start date "2021/12/13" and end date "2021/12/15".
The event "CANS 2021" is part of the event series identified by [[Event Series:CANS]]
Deadlines
|
||
Submission |
|
||
Paper |
|
||
Notification |
|
||
Camera-Ready |
Metrics
Venue
Warning: Venue is missing. The map might not show the exact location.
Areas of Interest
- • Access Control
- • Embedded System Security
- • Security in Pervasive Systems
- • Anonymity & Pseudonymity
- • Formal Methods for Security
- • Security in Social Networks
- • Applied Cryptography
- • Hash Functions
- • Sensor Network Security
- • Attacks & Malicious Code
- • Identity Management
- • Trust Management
- • Authentication & Identification
- • Key Management
- • Usable Security
- • Biometrics
- • Language-Based Security
- • Virtual Private Networks
- • Block & Stream Ciphers
- • Malware Analysis and Detection
- • Wireless and Mobile Security
- • Blockchain Security and Privacy
- • Network Security
- • Peer-to-Peer Security & Privacy
- • Cryptographic Algorithms and Primitives
- • Security and Privacy for Big Data
- • Privacy-Enhancing Technologies
- • Cryptographic Protocols
- • Security and Privacy in the Cloud
- • Public Key Cryptography
- • Cyberphysical Security
- • Security in Content Delivery
- • Secure Distributed Computing
- • Data and Application Security
- • Security in Crowdsourcing
- • Security Architectures
- • Denial of Service Protection
- • Security in Grid Computing
- • Security Metrics
- • Data Protection
- • Security in the Internet of Things
- • Security Models
- • Data and Computation Integrity
- • Security in Location Services
- • Security Policies