Difference between revisions of "CANS 2021"

From OPENRESEARCH fixed Wiki
Jump to navigation Jump to search
(modified through wikirestore by Th)
 
(modified through wikirestore by orapi)
 
(4 intermediate revisions by the same user not shown)
Line 8: Line 8:
 
|has general chair=Stephan Krenn
 
|has general chair=Stephan Krenn
 
|has program chair=Mauro Conti, Marc Stevens
 
|has program chair=Mauro Conti, Marc Stevens
|ISBN=
 
 
|Acronym=CANS 2021
 
|Acronym=CANS 2021
|End date=2021/12/15
+
|End date=2021-12-15
 
|Series =CANS
 
|Series =CANS
 
|Type  =Conference
 
|Type  =Conference
Line 16: Line 15:
 
|State  =AT/9
 
|State  =AT/9
 
|City  =AT/9/Vienna
 
|City  =AT/9/Vienna
 +
|Year  =2021
 
|Homepage=https://cans2021.at/
 
|Homepage=https://cans2021.at/
 
|Ordinal=20
 
|Ordinal=20
|Start date=2021/12/13
+
|Start date=2021-12-13
 
|Title  =International Conference on Cryptology and Network Security
 
|Title  =International Conference on Cryptology and Network Security
|wikicfpId=125211}}
+
|wikicfpId=125211
 +
|ISBN  =
 +
}}
 
==== Areas of Interest ====
 
==== Areas of Interest ====
 
* • Access Control
 
* • Access Control

Latest revision as of 03:19, 7 December 2021


Event Rating

median worst
Pain1.svg Pain5.svg

List of all ratings can be found at CANS 2021/rating

CANS 2021
International Conference on Cryptology and Network Security
Ordinal 20
Event in series CANS
Dates 2021-12-13 (iCal) - 2021-12-15
Homepage: https://cans2021.at/
Twitter account: @CansConference
Submitting link: https://easychair.org/conferences/?conf=cans2021
Location
Location: AT/9/Vienna, AT/9, AT
Loading map...

Important dates
Papers: 2021/06/01
Submissions: 2021/06/01
Notification: 2021/09/01
Camera ready due: 2021/10/01
Committees
General chairs: Stephan Krenn
PC chairs: Mauro Conti, Marc Stevens
Table of Contents
Tweets by @CansConference| colspan="2" style="padding-top: 2px; " |

Areas of Interest

  • • Access Control
  • • Embedded System Security
  • • Security in Pervasive Systems
  • • Anonymity & Pseudonymity
  • • Formal Methods for Security
  • • Security in Social Networks
  • • Applied Cryptography
  • • Hash Functions
  • • Sensor Network Security
  • • Attacks & Malicious Code
  • • Identity Management
  • • Trust Management
  • • Authentication & Identification
  • • Key Management
  • • Usable Security
  • • Biometrics
  • • Language-Based Security
  • • Virtual Private Networks
  • • Block & Stream Ciphers
  • • Malware Analysis and Detection
  • • Wireless and Mobile Security
  • • Blockchain Security and Privacy
  • • Network Security
  • • Peer-to-Peer Security & Privacy
  • • Cryptographic Algorithms and Primitives
  • • Security and Privacy for Big Data
  • • Privacy-Enhancing Technologies
  • • Cryptographic Protocols
  • • Security and Privacy in the Cloud
  • • Public Key Cryptography
  • • Cyberphysical Security
  • • Security in Content Delivery
  • • Secure Distributed Computing
  • • Data and Application Security
  • • Security in Crowdsourcing
  • • Security Architectures
  • • Denial of Service Protection
  • • Security in Grid Computing
  • • Security Metrics
  • • Data Protection
  • • Security in the Internet of Things
  • • Security Models
  • • Data and Computation Integrity
  • • Security in Location Services
  • • Security Policies