(mobo import Concept___Events-migrated) |
m (Text replacement - "Homepage=" to "Official Website=") |
||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
|Title=11th Conference on Security and Cryptography for Networks | |Title=11th Conference on Security and Cryptography for Networks | ||
|Type=Conference | |Type=Conference | ||
− | | | + | |Official Website=http://scn.di.unisa.it/ |
|City=Amalfi | |City=Amalfi | ||
|Country=Country:IT | |Country=Country:IT | ||
Line 9: | Line 9: | ||
|has program chair=Dario Catalano | |has program chair=Dario Catalano | ||
|Has PC member=Elena Andreeva, Manuel Barbosa, Carlo Blundo, Jean-Sebastien Coron, Mario Di Raimondo, Léo Ducas | |Has PC member=Elena Andreeva, Manuel Barbosa, Carlo Blundo, Jean-Sebastien Coron, Mario Di Raimondo, Léo Ducas | ||
− | |||
− | |||
|pageCreator=User:Curator 55 | |pageCreator=User:Curator 55 | ||
|pageEditor=User:Curator 55 | |pageEditor=User:Curator 55 | ||
Line 22: | Line 20: | ||
}} | }} | ||
{{Event Deadline}} | {{Event Deadline}} | ||
+ | {{Event Metric | ||
+ | |Number Of Submitted Papers=66 | ||
+ | |Number Of Accepted Papers=30 | ||
+ | }} | ||
{{S Event}} | {{S Event}} | ||
==Topics== | ==Topics== |
Latest revision as of 14:20, 19 October 2022
The document "SCN 2018" was published on "2022-10-19T14:20:06" on the website "ConfIDent" under the URL https://confident-conference.org/index.php/Event:SCN 2018.
The document "SCN 2018" describes an event in the sense of a conference.
The document "SCN 2018" contains information about the event "SCN 2018" with start date "2018/09/05" and end date "2018/09/07".
The event "SCN 2018" is part of the event series identified by [[Event Series:SCN]]
Deadlines
Metrics
Submitted Papers
66
Accepted Papers
30
Venue
Amalfi, Italy
Warning: Venue is missing. The map might not show the exact location.
Topics
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
* Anonymity and Privacy * Applied Cryptography and Implementations * Authentication, Identification and Access Control * Block and Stream Ciphers * Complexity-Theoretic Cryptography * Cloud Computing Security * Cryptanalysis * Cryptocurrencies * Cryptographic Hash Functions * Cryptographic and Security Protocols * Digital Signatures and Message Authentication Codes * Distributed Systems Security * Formal Security Methods * Information-Theoretic Security * Network, Web and Wireless Security * Public-Key Encryption * Physical Cryptography * Security Architectures and Models * Software and Systems Security