Difference between revisions of "Event:SCN 2018"

From ConfIDent
(mobo import Concept___Events-migrated)
m (Text replacement - "Homepage=" to "Official Website=")
 
(One intermediate revision by the same user not shown)
Line 3: Line 3:
 
|Title=11th Conference on Security and Cryptography for Networks
 
|Title=11th Conference on Security and Cryptography for Networks
 
|Type=Conference
 
|Type=Conference
|Homepage=http://scn.di.unisa.it/
+
|Official Website=http://scn.di.unisa.it/
 
|City=Amalfi
 
|City=Amalfi
 
|Country=Country:IT
 
|Country=Country:IT
Line 9: Line 9:
 
|has program chair=Dario Catalano
 
|has program chair=Dario Catalano
 
|Has PC member=Elena Andreeva, Manuel Barbosa, Carlo Blundo, Jean-Sebastien Coron, Mario Di Raimondo, Léo Ducas
 
|Has PC member=Elena Andreeva, Manuel Barbosa, Carlo Blundo, Jean-Sebastien Coron, Mario Di Raimondo, Léo Ducas
|Submitted papers=66
 
|Accepted papers=30
 
 
|pageCreator=User:Curator 55
 
|pageCreator=User:Curator 55
 
|pageEditor=User:Curator 55
 
|pageEditor=User:Curator 55
Line 22: Line 20:
 
}}
 
}}
 
{{Event Deadline}}
 
{{Event Deadline}}
 +
{{Event Metric
 +
|Number Of Submitted Papers=66
 +
|Number Of Accepted Papers=30
 +
}}
 
{{S Event}}
 
{{S Event}}
 
==Topics==
 
==Topics==

Latest revision as of 14:20, 19 October 2022

The document "SCN 2018" was published on "2022-10-19T14:20:06" on the website "ConfIDent" under the URL https://confident-conference.org/index.php/Event:SCN 2018.
The document "SCN 2018" describes an event in the sense of a conference.
The document "SCN 2018" contains information about the event "SCN 2018" with start date "2018/09/05" and end date "2018/09/07".
The event "SCN 2018" is part of the event series identified by [[Event Series:SCN]]
Deadlines
Metrics
Submitted Papers
66
Accepted Papers
30
Venue

Amalfi, Italy

Loading map...

Topics

All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:

*     Anonymity and Privacy 
*     Applied Cryptography and Implementations 
*     Authentication, Identification and Access Control 
*     Block and Stream Ciphers 
*     Complexity-Theoretic Cryptography 
*     Cloud Computing Security 
*     Cryptanalysis 
*     Cryptocurrencies 
*     Cryptographic Hash Functions 
*     Cryptographic and Security Protocols 
*     Digital Signatures and Message Authentication Codes 
*     Distributed Systems Security 
*     Formal Security Methods 
*     Information-Theoretic Security 
*     Network, Web and Wireless Security 
*     Public-Key Encryption 
*     Physical Cryptography 
*     Security Architectures and Models 
*     Software and Systems Security
Cookies help us deliver our services. By using our services, you agree to our use of cookies.