Difference between revisions of "Event:SCN 2016"

From ConfIDent
(mobo import Concept___Events-migrated)
(mobo import Concept___Events_With_Metrics-migrated)
Line 9: Line 9:
 
|has program chair=Vassilis Zikas
 
|has program chair=Vassilis Zikas
 
|Has PC member=Divesh Aggarwal, User:Curator 57eta Agrawal, Joël Alwen, Gilad Asharov, Foteini Baldimtsi, Jeremiah Blocki
 
|Has PC member=Divesh Aggarwal, User:Curator 57eta Agrawal, Joël Alwen, Gilad Asharov, Foteini Baldimtsi, Jeremiah Blocki
|Submitted papers=67
 
|Accepted papers=30
 
 
|pageCreator=User:Curator 55
 
|pageCreator=User:Curator 55
 
|pageEditor=User:Curator 55
 
|pageEditor=User:Curator 55
Line 22: Line 20:
 
}}
 
}}
 
{{Event Deadline}}
 
{{Event Deadline}}
 +
{{Event Metric
 +
|Number Of Submitted Papers=67
 +
|Number Of Accepted Papers=30
 +
}}
 
{{S Event}}
 
{{S Event}}
 
==Topics==
 
==Topics==

Revision as of 14:14, 18 October 2022

The document "SCN 2016" was published on "2022-10-19T14:18:33" on the website "ConfIDent" under the URL https://confident-conference.org/index.php/Event:SCN 2016.
The document "SCN 2016" describes an event in the sense of a conference.
The document "SCN 2016" contains information about the event "SCN 2016" with start date "2016/08/31" and end date "2016/09/02".
The event "SCN 2016" is part of the event series identified by [[Event Series:SCN]]
Deadlines
Metrics
Submitted Papers
67
Accepted Papers
30
Venue

Amalfi, Italy

Loading map...

Topics

All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:

  • Anonymity and Privacy
  • Applied Cryptography and Implementations
  • Authentication, Identification and Access Control
  • Block and Stream Ciphers
  • Complexity-Theoretic Cryptography
  • Cloud Computing Security
  • Cryptanalysis
  • Cryptocurrencies
  • Cryptographic Hash Functions
  • Cryptographic and Security Protocols
  • Digital Signatures and Message Authentication Codes
  • Distributed Systems Security
  • Formal Security Methods
  • Information-Theoretic Security
  • Network, Web and Wireless Security
  • Public-Key Encryption
  • Physical Cryptography
  • Security Architectures and Models
  • Software and Systems Security
Cookies help us deliver our services. By using our services, you agree to our use of cookies.